The internet Flashcards

1
Q
  1. Describe the role of an Internet Service provider (ISP):
A

Allows individuals and users to connect to the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. What is meant by the term protocol
A

A set of rules for communication between devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. Define the internet:
A

a network of interconnected computer networks which use an end-to-end communication protocol. It is mostly wired with cables that pass under the ocean connecting different continents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. What is the different between a router and a gateway?
A

A Router is used to connect different networks together and attempts to send packets via the fastest route possible which may be the route with the least number of hops or the least congested route at the time. A gateway is similar but it allows for networks that use different protocols to communicate by stripping the header of packets and replacing it with headers that comply with the protocols of the new network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. How can a firewall act as a proxy server?
A

A firewall is a hardware/software that allows or stops individual packets from entering or leaving a network.
A proxy server is a server that sits between a private and a public network and monitors traffic between the two networks. A firewall acts as a proxy server if it manages the traffic between a public and a private network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. Functions of a proxy server?
A

When a device in a private network sends a packet through a firewall and into a public network, the packet’s “sender” address is that of the firewall, rather than the device’s private IP address.
- Add web filtering features.
- Speeds up performance by caching websites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. Describe how two devices can transmit data using asymmetric encryption?
A

Each device has a pair of mathematically related keys – a public key and a private key.
- A message encrypted using the public key can only be decrypted with the corresponding private key.
- A message is encrypted using the recipients public key this means the message can only be decrypted by the recipient’s private key which only they have access to.
- There is no need for private key to be shared -reduces risk of data breaches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. Why may someone wish to use asymmetric encryption over symmetric encryption?
A
  1. In symmetric encryption the data is encrypted and decrypted using the same key which means the key should be shared over the network which makes is vulnerable to interceptions
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. Define stateful inspection and how it works:
A
  1. Continuously monitors incoming and outgoing traffic and checks the payload of each packet instead of the just the header for suspicious activities. It requires the firewall to maintain a state table which keeps track of all the conversations to ensure all inbound and outbound packets are expected.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. Give vulnerabilities within a network and how to overcome them:
A
  1. Poor code quality for example code that leaves data left in memory to be exploited later. Code reviews help identify and remove vulnerabilities within programs. Firewalls can be used to monitor and identify suspicious traffic. Anti-virus software scans files and emails for suspicious activity.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. What is the difference between virus and worms?
A

A virus is a malicious form of self-replicating software that attaches itself to programs and files so it can easily infect the computer system. Worms unlike viruses don’t require a host program to spread instead copies itself independently through the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  1. How can a trojan cause harm?
A

It is malware that is disguised as useful software and when the program is run the malware is executed unknowing to the user doing malicious actions such as data theft, redirecting search requests, installing further malware etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. Describe how digital signatures work:
A

Used to verify that the message has not been tampered with during transmission.
- A digest is created using the message for example a number is generated by performing a hashing algorithm on the message so, if content of message is changed then digest won’t match that message.
- The digest is encrypted using sender’s private key and appended to the message,
- Then the whole message including the digest is encrypted using receivers’ public key.
- Once the message is received, the recipient can decrypt the overall message using their private key then decrypt the digest using the sender’s public key.
- The user performs the same hashing function on the message and checks if the digest matches. If it doesn’t match it can be assumed the message was altered during transmission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  1. What is a digital certificate?
A
  1. Verifies ownership of a key pair to ensure a fake isn’t being used by an imposter. The certificate a serial number, the owner’s name, an expiry date, the owner’s public key and the certificate authority’s digital signature
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  1. Describe the purpose of a Wireless Access Point:
A
  1. Wireless access point is usually wired and allows devices to connect to a wireless network and broadcast and receives wireless signals to and from devices on the network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  1. Describe the Purpose of Wireless network adapter
A
  1. Built into the device and allows devices to communicate using wi-fi.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
  1. How does a MAC address whitelist work?
A

A MAC (media access control) address is a unique number that is assigned to a network interface card when the card is manufactured.

MAC address filtering is a method used to control which devices can connect to a network. IT specifies which device are allowed to connect to the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q
  1. Define baud rate, bit rate, bandwidth and latency and their relationships:
A

The bit rate is the number of bits transferred per second, the baud rate is the number of signal changes per second, bandwidth is the maximum rate of data transfer of a communication channel and latency is the delay from the time the signal is sent to the time it is received. The bit rate and the bandwidth are directly proportional. Bit rate = baud rate * number of bits per signal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What if the function of the application layer?

A

uses protocols that are designed to work with specific types of applications, for example a web browser uses HTTP, while an email client uses SMTP, alongside either IMAP or POP3.

20
Q

Describe the function of the transport layer?

A

breaks the application data down into segments (TCP) or datagrams (UDP). Sequence numbers are allocated, and source and destination port numbers are added to the header. For TCP, delivery is acknowledged, and lost segments are retransmitted.

21
Q

Why is User datagram protocol used even though it is unreliable?

A

used in applications that can tolerate some loss of data like ‘facetime’ where the loss of a few frames is negligible in comparison to the fast data transfer speed.

22
Q

How does TCP work ?

A

At the receiving end, TCP keeps a record of the incoming sequence numbers and acknowledges each segment. If the sender does not receive an acknowledgement, the segment is resent. The sequence numbers are added to the segment header. This ensures no data is lost.
(waits for every packet to arrive)

23
Q

What is a socket?

A

A combination of a devices IP address and the port number for a given application. The server needs to be able to handle multiple concurrent sessions as it communicates with many clients. Each session is identified by its own socket.

24
Q

Describe the function of the internet/network layer?

A

prepares packets for the internet. Source and destination IP addresses are added at this stage.

25
Q

What is the function of the link layer?

A

is responsible for transporting IP packets across each of the individual links that make up the path between client and server. At this level, networking protocols, such as Ethernet, are used.

26
Q

what is a client server model?

A

The client–server model is a paradigm where providers of resources are designated as servers, and resource requesters are designated as clients.

27
Q

What is a thin-client?

A

a device that only had limited storage, main memory with very little processing power.

28
Q

Advantages of thin-client?

A
  • cheaper to buy
    -software always kept up to date
    -arguably more secure, as data is not held locally
  • responsibility for backup is with the company storing the data.
29
Q

Disadvantages of thin-client?

A
  • always needs to be connected to the internet
  • requires a decent amount of bandwidth to support the amount of data transferred between client and server.
30
Q

why might programmers prefer server side processing?

A

-There is more control over the environment in which the scripts are be executed.
- servers can be optimised to cope with heavy processing demand.
-scripts are hidden — this helps protect intellectual copyright and helps prevent anyone from tampering with the code

31
Q

HTTP (Hyper Text Transfer Protocol)

A

Web servers hold web pages in text form, which they can deliver to clients using HTTP
80

32
Q

HTTPS

A

a secure way of transferring data between a web browser and a server
443

33
Q

FTP

A
  • used to transfer files between two devices
  • allows client to download from server
  • allows client to upload to server
    20 & 21
34
Q

SMTP

A

Used for sending emails. SMTP is used between a client and an email server.
25, 587 & 465

35
Q

POP3

A

Used for retrieving emails from an email server.
POP3 communicates with email servers to check for and download any new messages.
110 & 995

36
Q

SSH

A

Secure Shell (SSH) can provide an encrypted connection for remote access to another computer. It achieves this by encrypting the messages sent between the SSH client and the SSH server, and thus provides a secure link through which users can communicate with a remote computer.

22

37
Q

Packet switching

A

Packet switching is the process of data being broken into packets before being sent over the network and then reassembled at the other end. This allows data to be transfer across a network efficiently.

38
Q

IP (internet protocol)

A

The internet protocol is a set of rules that govern the transmission of data across the internet.

39
Q

purpose of MAC address

A

to provide an unique hardware address for every node on a network

40
Q

Hopping

A

At each step the MAC address is stripped out, and the source MAC address is replaced by the destination address of the previous hop and the destination MAC address is replaced by the MAC address of the next router.

41
Q

What is a scheme?

A

The Scheme, which is usually a protocol, specifies the syntax that is needed within the remainder of the URL

42
Q

Fully qualified domain name:

A

Domain that specifies an exact resource on the internet and can be interpreted only one way. A FQDN will always include servers host name.
eg: www.

43
Q

what is an URL?

A
  • Every resource that can be accessed using the internet needs to have an unique identifier.
  • Specifies both the location of the resource and the protocol that will be used to access the resource.
44
Q

Domain name servers:

A

uses a look up table to find the corresponding IP address for a given domain name.

If a DNS server does not have a record for the domain user is trying to access, the request is passed to another server.

45
Q

What is the purpose of internet registries?

A

organisation responsible for allocating IP addresses.
Protects worlds depleting IP addresses by assigning unused IP addresses as new IP addresses instead of allocating a brand new one straight away.

46
Q

An URL

A

is an address assigned to files on the internet.
Different files can be used in URLs to access different types of files in different ways.