Week_2 Flashcards

1
Q

Name a replacement for SSL

A

TLS(Transport Layer Security)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a Idempotent Method?

A

Multiple requests should have the same result as a singl request

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Name 3 SSL Objectives.

A

Quthenticating the client and server to each other

Ensuring data integrity

Securing data privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How many protocols does SSL use?

A

Zero

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does SSL Handshake Protocol do?

A

Uses SSL record protocol to establish a SSL connection.

Authenticates the served to the client
Establishes an encrypted SSL connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does SSL Record Protocol do?

A

Defines data transmit format

Ensure data security and integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does the Header contain?

A

Length of record

Length of padding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is MAC responsible for?

A

MAC is responsible for the verification and integrity of the message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Name one hash function used to calculate MAC.

A

MD5

Or

SHA-1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Name 3 components established by CipherSuite

A

Method of key exchange between the server and client

Encryption algorithm for data encryption purposes

Function used for obtainjng the MAC value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is certificate exchange?

A

When the server sends a certificate to the client for authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the primary function of a web server?

A

Deliver web pages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does the path translation “URL” stand for?

A

Uniform Resource Locator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is faster kernal mode or user mode?

A

Kernal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Why is Kernal mode faster than user mode?

A

Kernal mode can directly use all the hardware resources is needs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Why is User mode slower than Kernal mode?

A

User mode has to request permission to use more memory or CPU.

Takes time
Resources not always available

17
Q

How many concurrent client connections can load limit hold?

A

Between 2-80,000 per IP address

18
Q

Name some causes for an overload

A

Too much legitimate concurrent web traffic

DDOS
Computer worms
Viruses
Internet bots
Network slowdowns
Web server unavailability
19
Q

Name some anti-overload techniques

A

Managing network traffic with: firs,HTTP traffic nanagers, bandwidth management and traffic shaping.

Web cache techniques
Using different domain names
Multiple web servers per host

20
Q

What percentage rule should you follow for caching?

A

80%-traffic 20%-web pages