1.3.3 Networks - The Internet Flashcards

1
Q

Internet

A

A network of interconnected devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

World Wide Web

A

A collection of resources accessible via the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Backbone

A

A set of dedicated connectors that connect several large networks at different points on the globe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Internet Protocol (IP) Address

A

A unique identifier for each device on a network, IPv4 has four 8-bit values separated by dots

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Uniform Resource Locator (URL)

A

Specifies the means of accessing a resource across a network as well as its location
Handled by internet registries

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Domain Name System (DNS)

A

The architecture used to map a URL to an IP address. Stored in a DNS server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Finding an IP address

A

Checked by the local DNS, the client’s known DNS server, the root DNS then the .co DNS until one can find the IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Protocol

A

The first part of a URL, usually https:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Host server name

A

The second part of a URL, the name of the server, often www.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Domain name and second domain name

A

The domain name is the name of the website e.g. ocr/bbc

The second domain name is usually the type e.g. .edu/.sch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Circuit Switching

A

Creating a communication connection between two endpoints for the duration of data transfer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Packets

A

The equal size chunks that data is broken down into and are received

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Latency

A

The time taken for a packet to reach its endpoint

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Transportation of Packets

A

Routers store data about available routes to neighbouring routers in a routing table. The router will send the packet to the nearest router that doesn’t go backwards, this is repeated to the end destination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Hop

A

A transfer of packets between routers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Sequence number

A

Tells the receiver which order the packets should be in

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What does a header contain?

A

The sender and recipient’s IP address, the protocol being used, the time to live (hop limit) and packet number x of y

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What does a trailer contain?

A

The end of packet flag and checksum/CRC (cyclic redundancy checking). Used to check the data has not been corrupted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Packet size

A

Typically 500-1500 bytes
Packets are small to ensure that packets don’t take too long to transfer but not too large that adding headers and trailers slows it down.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Protocol

A

A set of rules, or a formal description, of the format of digital transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

TCP/IP and layers

A

Transmission control protocol / internet protocol

A stack, top to bottom: application, transport, network, link

22
Q

Application layer

A

Defines what information is put together to send data and what protocol should be used, displays to the user on return

23
Q

Transport layer

A

Splits the data into a series of packets and numbers each, requests retransmission of lost packets. Reorders packets upon receiving

24
Q

Network layer

A

Addresses packets with the source and destination IP addresses, removes on return.

25
Q

Link layer

A

Adds the MAC address of the source and destination or the router if across a different network, removes MAC address on return.

26
Q

MAC address

A

Media Access Control - Uniquely identifies a physical device with a network interface card.
A 48-bit 12-digit hexadecimal number

27
Q

Port number

A

Used to alert a specific application to deal with data sent to a computer, used by a protocol to specify what data is sent

28
Q

FTP

A

File transfer protocol - An application level protocol used to move files across a network

29
Q

Email protocols

A

Use SMTP to send, POP3 to download from a mail server and IMAP to manage emails on a server. POP3 is only on one computer, IMAP across multiple.

30
Q

Firewall security uses

A

Only open certain ports so only certain traffic can enter

31
Q

Packet filtering

A

Where the firewall inspects packets to see which port they are trying to enter

32
Q

Proxy server

A

Makes a request on behalf of your computer, hides the request IP address from the recipient

33
Q

Proxy server uses

A

Enables anonymous surfing, filters undesirable web content, logs user data with their request, produces a cache of previously visited sites

34
Q

Botnets

A

A collection of software robots which infect unknowing computers

35
Q

Distributed denial of service (DDoS)

A

Where a malicious user sabotages a network of infected computers to sabotage a website or server by sending many requests

36
Q

Hacking

A

The process by which cyber criminals take over a computer

37
Q

Malware

A

Software which infects the computer that it is being run on

38
Q

Pharming

A

Redirecting a URL to send users to a malicious website

39
Q

Phishing

A

Fake emails or text messages created to look like they are from a legitimate source

40
Q

Ransomware

A

Malware which requires you to pay a ransom to bypass it. Lock screen malware prevents access, encryption malware stops you accessing data

41
Q

Spam

A

Mass distribution of unsolicited messages

42
Q

Spoofing

A

A website or email address designed to appear like a legitimate source

43
Q

Spyware

A

Software which connects personal information without you knowing

44
Q

Trojan Horses

A

A malicious program disguised as or embedded in legitimate software

45
Q

Viruses

A

Malicious computer programs intended to infect you and your contacts

46
Q

Wi-FI eavesdropping

A

Recording information communicated over an unsecure Wi-Fi network

47
Q

Worm

A

A malicious program stored in memory which can self-replicate.

48
Q

HTTP

A

Hypertext Text Transfer Protocol

49
Q

SMTP

A

Simple Mixed Transfer Protocol

50
Q

IMAP

A

Internet Messaging Access Protocol

51
Q

Blagging

A

A type of attack in which the attacker creates a situation in which the user shares confidential information or performs actions that aren’t usually performed

52
Q

Firewall

A

A device deigned to prevent unauthorised access to a network. Consists of two NICs between the user and the internet.