Unit 10 - The Internet Flashcards

1
Q

Define Internet

A

A network of inter-connected networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define World Wide Web

A

The set of resources that are available using the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define Internet Backbone

A

The principal data routes between interconnected networks and the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define IP address

A

A unique identifier for a node connected to a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define FQDN

A

Fully Qualified Domain Name - a domain name that identifies the exact location of a web page in the WWW

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define URL

A

Uniform Resource Locator - a link that specifies the means of accessing a recourse and its location across a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define DNS

A

Domain Name System Server - dedicate computer (used as servers) with an index of domain names and their corresponding IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define data packet

A

A block of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define circuit switching

A

Creating a communication connection between two end points for the duration of a phone call or transfer of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define latency

A

The time taken for a piece of data to arrive at the desired location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define gateway

A

A networking device that connects two networks which are using different protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define a firewall

A

Hardware or software that consists of a series of ports that control the traffic that pass through them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define stateful inspection

A

Scanning payloads for malicious software before allowing them access to a network or device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Define proxy server

A

A server that acts on a devices behalf in order to keep the IP address of that client hidden when doing things such as using the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Define encryption

A

The act of encoding a plaintext message so that is cannot be deciphered unless you have a numerical key to decrypt it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Define symmetric encryption

A

Using the same key to decrypt the message as you used to encrypt the message and sending it across a network to the receiver

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Define asymmetric encryption

A

Using two different keys to encrypt and decrypt a message so that a key does not have to be sent over a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Define a digital signature

A

A method of verifying the integrity of a message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Define a worm

A

An individual program that does not need the user to spread through a computer and exploit vulnerabilities in the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Define a trojan

A

A malicious piece of software that masquerades as something useful, it cannot self replicate but it can perform functions such as opening up back doors to your computer so the bandwidth and data can be exploited remotely

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Define phishing

A

A communication that causes the user to visit a website and enter information that can then be exploited .e.g. bank details

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Define SQL corruption

A

Entering commands into an SQL database to change processing or corrupt or access data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Define buffer overflow

A

When a program attempts to write data to a location that is too small and the data is placed into neighboring instruction space

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Define TCP/IP stack

A

A set of rules used to format messages so that they can be sent across a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Define MAC

A

Media Access Control - an address that uniquely identifies a physical device with a Wireless Network Interface Card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Define port

A

Alerts a device to deal with a piece of data to the computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Define socket

A

An endpoint of a communication channel (often comprised of the IP address and the port)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Define SSH

A

Secure Shell - an encrypted protocol that allows secure communication between nodes across a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Define unusable IP addresses

A

An IP address that is not used as they are reserved for specific purposes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Define NAT

A

Network Address Translation Service - a service provided by routers or other devices that allows devices with unusable IP addresses to communicate with the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Define subnet mask

A

Used on an IP address to identify the network identifier within the address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Define network identifier

A

The section of the IP address that identifies the network the nodes reside in

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Define host identifier

A

The section of the IP address that identifies the specific nodes within the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Define DCHP

A

Dynamic Host Configuration Protocol - a protocol that assigns dynamic IP addresses to devices within a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Define a static IP address

A

An IP address that is assigned and does not change every time the same device connects to the network (as opposed to a dynamic IP address)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Define API

A

Application Programming Interface - a set of functions and protocols that a server provides to a client that details its functionality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Define WebSocket protocol

A

An API used to establish a persistent TCP socket connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Define thick client

A

One that can do much of the processing independently of the server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Define thin client

A

A client that relies on the server for the majority of the processing a storage capacity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Define zero client

A

A type of thin client which downloads the latest configuration and OS version from the server each time the user switches on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Describe the internet backbone

A

A set of dedicated connection that are used to connect key large networks across the globe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Define ISP

A

Internet Service Provider - a company that provides subscribers with access to the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Which two parts make up a fully qualified domain name?

A

The domain name and the host name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Which three parts make up a URL?

A

The domain name, the host name and the resource to be accessed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

What is the process when a computer wants to access a web page?

A

A request is made to the DNS server by the computer which provides the DNS server with the domain name. The DNS then returns the IP address the computer will use to access the web page.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

How many global internet registries are there?

A

5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Why is packet switching better than circuit switching?

A

Packet switching allows communication channels to be shared

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

What happens during circuit switching?

A

A dedicated communications channel (route for packets) is made between two points for the duration of a communication, this channel cannot be shared

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

What are the three parts of a packet?

A

Header, payload and trailer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

What is the size range for a payload?

A

500 to 1500 bytes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

What does the trailer do?

A

It flags that it is the end of the packet and also includes checksum

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

What is a gateway?

A

A gateway occurs when a packet needs to be transferred between two networks with different protocols. The header is removed and then reapplied with the new protocols and correct format for the new network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

What device is a gateway often integrated with?

A

A router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

What 4 things are included in the packet’s header?

A

Sender’s IP address, receiver’s IP address, protocol and packet number

55
Q

What information do routers store?

A

Information about available routes to the destination node

56
Q

Why is packet switching used?

A

Efficiency and reliability

57
Q

How does a firewall work?

A

A firewall operates a series of ports which only lets certain types of data through

58
Q

How does stateful inspection work?

A

Information is scanned for malicious software before it is let into the device

59
Q

What programming concept does stateful inspection rely on and why?

A

Machine learning as the software will remember and record its decisions relating to certain pieces of infomation

60
Q

What are the 4 main functions of a proxy server?

A
  1. Enables anonymous surfing
  2. Filters undesirable online content
  3. Logs user data and their requests
  4. Provides a cache of previously visited sites to speed up access
61
Q

How does symmetric encryption work?

A

The sender encrypts the message with a key which it then sends to the receiver along with the message. The receiver uses the key to decrypt the message

62
Q

What type of attack is symmetric encryption useless against?

A

‘Man in the middle’ attack

63
Q

What does hybrid encryption involve?

A

The user sending a key to be used in symmetric encryption over a network using asymmetric encryption and then using symmetric encryption for the rest of the communications

64
Q

How does asymmetric encryption work?

A

The sender encrypts the message uses a public key and the public key can only be decrypted with the private key.

65
Q

How is a digital signature made?

A
  1. Irreversibly reducing the unencrypted message to produce a hash encrypting the hash using their private key
  2. The send bundles the digital signature with the message and encrypts the bundle using the recipient’s public key
  3. The recipient of the message uses their private key to decrypt the bundle
66
Q

Describe the function of the application layer

A

Sending: ensures the data being sent is in the right format and employs the correct protocol .e.g. SMTP, FTP or HTTP
Receiving: presents the data for the user

67
Q

Describe the function of the transport layer

A

Sending: splits the data into packets, numbers each packet and adds a port number
Receiving: confirms that packets have been received and requests any missing packet

68
Q

What protocol does the transport layer use?

A

TCP (Transmission Control Protocol)

69
Q

Describe the function of the network layer

A

Sending: uses IP (internet protocol) to address the packets and router will ensure the package gets to the socket (the end point)
Receiving: removes the IP address

70
Q

What are routing tables?

A

Information stored in routers that allows the router to figure out the best route for information to take to reach the socket

71
Q

Describe the function of the link layer

A

Sending: concerning itself with the physical connection, it adds the MAC address of the next WNIC to the packets (this changes after every hop)
Receiving: passes the MAC address to the network layer

72
Q

What does FTP stand for and what ports does it use?

A

File Transfer Protocol, ports 20 and 21

73
Q

What is SSH used for?

A

It is used to manage remote servers and other computers

74
Q

Why is SSH good for managing remote servers?

A

It uses public key encryption which means that the data in the communication channel is protected

75
Q

What is SSH tunnelling?

A

Become some functions (ports) may be blocked by firewalls .e.g. port 25 may be blocked to prevent someone from sending emails, the SSH uses a different port and this port can be used to pass other information through and overcome this problem

76
Q

What is SMTP used for?

A

Sending or forwarding mail between mail servers and the destination

77
Q

What is POP3 used for?

A

Downloading emails stored on a remote server to a local client which are then removed after download

78
Q

What is IMAP used for?

A

Managing emails on a server so multiple clients can access the same email account at the same time

79
Q

What 3 languages are web pages written in?

A

HTML, CSS or JavaScript

80
Q

How are web pages broken down to be transferred?

A

HTML, CSS or JavaScript is broken down into their parts .e.g. headers and body and then they are broken down further and transferred according to TCP/IP protocols

81
Q

Why are private, non-routable addresses used on LANs or private WANs?

A

It reduces the need for each device to have a unique IP address as two devices in different private networks can have the same IP address

82
Q

Why can devices with private, non-routable addresses not access the internet directly?

A

Because there may be another device in a different network with the same IP address, if they both try to access the internet, it becomes confusing and the system will crash

83
Q

Which piece of hardware do devices with private, non-routable IP addresses use to access the internet?

A

A device that can provide Network Address Translation (NAT) service/ gateway

84
Q

What does NAT do?

A

When a device with a private, non-routable IP address send packets outside of the network, they will first send it to a server or gateway that provides NAT, there the server will remove the original IP address and port and replace it with its external IP address and port, it then stores the original IP address and the new one it generated in a table so when the packets return it can swap them again and route the packet to the correct device within the subnetwork

85
Q

What is port forwarding?

A

Where publicly accessible servers are given a private, non-routable IP address to associate with a port. The public requests reach the external router of the private network using a the assigned port and data packets are automatically forwarded within the network to the correct device based on the non-routable IP address assigned to that port.

86
Q

What are the two parts of an IPv4 address?

A

The network identifier and the host identifier

87
Q

How can a network identifier be found within an IP address?

A

A subnet mask is used. It has all of the network identifier bits set to 1 and all the host identifier bits set to 0. By performing an AND operation between the subnet mask and the IP address it can isolate the network identifier.

88
Q

Why are subnetworks created?

A

They are created by companies to split the number of available host IDs

89
Q

What are the benefits of subnetworks?

A
  1. The broadcast domain is reduced which increases security
  2. The number of data collisions are reduced
  3. The number of available host IDs is increased so more devices can be connected to the network
90
Q

Why can the host identifier and the network identifier be combined into one IP address?

A

Because they occupy complementary bits

91
Q

Why is IPv6 favoured over IPv4?

A

IPv4 cannot provide enough IP addresses for all the devices in the world anymore

92
Q

Why are static IP addresses uncommon?

A

Static IP addresses are easier to track and it means that fewer devices can connect to the network because the DHCP server cannot reclaim the IP address when the device disconnects

93
Q

What does DHCP stand for?

A

Dynamic Host Configuration Protocol

94
Q

What does DHCP do?

A

It assigns IP addresses and any other network configuration information to devices joining the network

95
Q

Why is DHCP beneficial?

A

It means that not all addresses are being used at once and that, if a device leaves the network, its IP address can be assigned to a different one joining

96
Q

What does CRUD stand for?

A

Create
Retrieve
Update
Delete

97
Q

Define each element of CRUD

A

C: write a record to a database
R: retrieve a record from the database
U: amend a record
D: remove a record from a database

98
Q

What is the flaw in the client having to request data from the server?

A

If too much time passes between the request being made and data being returned, the request will time out and the user will receive an error

99
Q

What type of connection is a WebSocket connection?

A

Bidirectional and simultaneous

100
Q

Why are WebSocket connections faster than others?

A

Packet sizes are reduced as they do not require headers

101
Q

What is the dynamic between the devices in a client-server model?

A

The client requests services from the server which then returns data and information in response to the request

102
Q

Which protocol is used for communication between servers and clients?

A

HTTP

103
Q

What does HTTP stand for?

A

Hypertext Transfer Protocol

104
Q

What are the four HTTP equivalents to CRUD that map to SQL commands?

A

Get
Post
Put
Delete

105
Q

What are the advantages of WebSocket connections?

A
  1. Superfast and interactive connection
  2. Packet sizes reduced
  3. Usable for websites that require real time updates
  4. Server load reduce
  5. Saves bandwidth
  6. Lower running costs
  7. Few web servers required
106
Q

What is REST and what does is stand for?

A

REpresentational State Transfer - an architectural style that determines how systems communicate with one another

107
Q

What are JSON and XML used for?

A

They are formats for standardised data objects that the server and client can process

108
Q

What are the advantages of JSON?

A
  1. Easier for humans to read, write and maintain
  2. More compact (less storage and quicker to transmit)
  3. Can be directly manipulated by JavaScript
109
Q

What are the advantages of XML?

A
  1. Any data type is allowed
110
Q

What are the disadvantages of JSON?

A
  1. Doesn’t work with all data type
111
Q

What are the disadvantages of XML?

A
  1. Expansive use of tags which make it difficult to follow
112
Q

List 6 different types of server

A
  1. File server
  2. Proxy server
  3. Print server
  4. Web server
  5. Application server
  6. Database server
113
Q

What is the function of a file server?

A

Stores files externally to a device (these can be any type of computer file)

114
Q

What is the function of a web server?

A

Provides access to web pages

115
Q

How does a proxy server work?

A

It provides a gateway to each client to enable access to the Internet

116
Q

What is the function of a print server?

A

Manages the printing of documents

117
Q

What is the function of a database server?

A

Stores the content of databases and provides access to individual clients

118
Q

What is the function of an application server?

A

Executes all of the procedures needed to run applications

119
Q

Define a router

A

A networking device that forwards data packets between networks

120
Q

Define an edge router

A

A router which links two networks

121
Q

What are the two types of edge routers?

A

Subscriber routers and enterprise routers

122
Q

Define enterprise router

A

A more powerful and expensive router

123
Q

Define subscriber router

A

A smaller scale and lower cost router

124
Q

Define a core router

A

A router which makes up part of the internet backbone

125
Q

How do gateways work?

A

Removal of the packet header and reapplying it in a different format and protocols to allow the packet to travel between networks with different protocols

126
Q

What is a hop limit?

A

The maximum number of hops a packet can make before it’s decided that it’s lost and is deleted

127
Q

Why is a hop limit necessary?

A

It ensures that packets don’t just travel never-endingly between routers

128
Q

Which section of a URL is not included in the FQDN?

A

The protocol .e.g. HTTP or HTTPS

129
Q

Define TLD as part of a FQDN

A

Top level domain -

130
Q

Define a non-routable IP address

A

An IP address that is used to identify devices on a private network

131
Q

Define routable IP addresses

A

An IP address that is used to identify devices on a public network

132
Q

If a subnet mask is not represented as a series of 1’s and 0’s what is the alternative format for its notation?

A

<IP> / <Number>
.e.g. 192.168.43.35 / 12
</Number></IP>

133
Q

What can you use a subnet mask for?

A

To determine whether your device is on the same network as the one you are transmitting to

134
Q

Why are dynamic IP addresses more beneficial than static IP addresses?

A

Dynamic IP addresses allow the DHCP server to reclaim the IP address each time the device disconnects meaning it can be assigned to a new device so more devices can connect to the network over time