SLR21 Networking and the internet Flashcards

1
Q

Physical star topology

A

“A topology for a Local Area Network (LAN) in which all nodes are individually connected to a central connection point, like a hub or a switch.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Logical bus network topology

A

“A network physically wired in star topology can behave logically as a bus network by using a bus protocol and appropriate physical switching.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Peer-to-peer

A

“A method of network organisation in which network stations can share resources on other network stations, so one station can use a printer on another station or save data on another station’s local storage.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Client-server

A

“A method of network organisation in which network stations make use of resources available at one or more servers.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Wi-Fi

A

“A facility that allows computers, smartphones or other devices to connect to the internet or communicate with one another wirelessly within a particular area.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Carrier Sense Multiple Access with Collision Avoidance

A

“A network multiple access method in which carrier sensing is used, but nodes attempt to avoid collisions by transmitting only when the channel is sensed to be ‘idle’.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Request to Send/Clear to Send

A

“An optional mechanism used by many wireless networking protocols to reduce frame collisions introduced by the hidden node problem.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Service Set Identifier

A

“The name assigned to a Wi-Fi (wireless) network. All devices in the network must use this case-sensitive name to communicate over Wi-Fi, which is a text string up to 32 bytes long.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Packet switching

A

“A method of sending data over a wide area network in which the message is broken into several parts. These parts are sent independently via the optimal route for each packet and reassembled at the destination.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Router

A

“In packet-switched networks like the internet, a router is a device (or in some cases, software) that determines the best way for a packet to be forwarded to its destination.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Gateway

A

“A network node that connects two networks using different protocols together. While a bridge is used to join two similar types of networks, a gateway is used to join two dissimilar networks.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Routing

A

“The process of moving packets across a network from one host to another. It is usually performed by dedicated devices called routers.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Uniform Resource Locator

A

“The address of a page on the World Wide Web.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Fully Qualified Domain Name

A

“Sometimes also referred to as an absolute domain name, it specifies its exact location in the tree hierarchy of the Domain Name System (DNS). It specifies all domain levels, including the top-level domain and the root zone. A fully qualified domain name is distinguished by its lack of ambiguity; it can be interpreted only in one way.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Domain name

A

“The part of a network address which identifies it as belonging to a particular domain.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

IP address

A

“A unique string of numbers separated by full stops that identifies each computer using the Internet Protocol to communicate over a network.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Domain Name System

A

“The internet’s equivalent of a phone book. They maintain a directory of domain names and translate them to Internet Protocol (IP) addresses; this is necessary because, although domain names are easy for people to remember, computers or machines access websites based on IP addresses.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Firewall

A

“A computer application used in a network to prevent external users from gaining unauthorised access to a computer system.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Packet filtering

A

“A firewall technique used to control network access by monitoring outgoing and incoming packets and allowing them to pass or halt based on the source and destination Internet Protocol (IP) addresses, protocols and ports.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Proxy server

A

“A dedicated computer or software system running on a computer that acts as an intermediary between an end-point device like a computer and another server from which a user or client is requesting a service.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Stateful packet inspection

A

“A firewall technology that monitors the state of active connections and uses this information to determine which network packets to allow through the firewall.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Symmetric encryption

A

“The oldest and best-known encryption technique. A secret key, which can be a number, a word, or just a string of random letters, is applied to the text of a message to change the content in a particular way; this might be as simple as shifting each letter by several places in the alphabet.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Asymmetric encryption

A

“This method of encryption involves using a pair of keys to encrypt and decrypt a message so that it arrives securely. Initially, a network user receives a public and private key pair from a certificate authority.”

24
Q

Digital certificate

A

“Verifies that a user sending a message is who he or she claims to be, and provides the receiver with the means to encode a reply. An individual wishing to send an encrypted message applies for a digital certificate from a Certificate Authority (CA).”

25
Q

Digital signature

A

“A digital code (generated and authenticated by public-key encryption) which is attached to an electronically transmitted document to verify its contents and the sender’s identity.”

26
Q

Worms

A

“Self-replicating virus that does not alter files but resides in active memory and duplicates itself. Worms use parts of an operating system that are automatic and usually invisible to the user. It is common for worms to be noticed only when their uncontrolled replication consumes system resources, slowing or halting other tasks.”

27
Q

Trojans

A

“A program that appears harmless but is, in fact, malicious.”

28
Q

Virus

A

“A piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.”

29
Q

“A topology for a Local Area Network (LAN) in which all nodes are individually connected to a central connection point, like a hub or a switch.”

A

Physical star topology

30
Q

“A network physically wired in star topology can behave logically as a bus network by using a bus protocol and appropriate physical switching.”

A

Logical bus network topology

31
Q

“A method of network organisation in which network stations can share resources on other network stations, so one station can use a printer on another station or save data on another station’s local storage.”

A

Peer-to-peer

32
Q

“A method of network organisation in which network stations make use of resources available at one or more servers.”

A

Client-server

33
Q

“A facility that allows computers, smartphones or other devices to connect to the internet or communicate with one another wirelessly within a particular area.”

A

Wi-Fi

34
Q

“A network multiple access method in which carrier sensing is used, but nodes attempt to avoid collisions by transmitting only when the channel is sensed to be ‘idle’.”

A

Carrier Sense Multiple Access with Collision Avoidance

35
Q

“An optional mechanism used by many wireless networking protocols to reduce frame collisions introduced by the hidden node problem.”

A

Request to Send/Clear to Send

36
Q

“The name assigned to a Wi-Fi (wireless) network. All devices in the network must use this case-sensitive name to communicate over Wi-Fi, which is a text string up to 32 bytes long.”

A

Service Set Identifier

37
Q

“A method of sending data over a wide area network in which the message is broken into several parts. These parts are sent independently via the optimal route for each packet and reassembled at the destination.”

A

Packet switching

38
Q

“In packet-switched networks like the internet, a router is a device (or in some cases, software) that determines the best way for a packet to be forwarded to its destination.”

A

Router

39
Q

“A network node that connects two networks using different protocols together. While a bridge is used to join two similar types of networks, a gateway is used to join two dissimilar networks.”

A

Gateway

40
Q

“The process of moving packets across a network from one host to another. It is usually performed by dedicated devices called routers.”

A

Routing

41
Q

“The address of a page on the World Wide Web.”

A

Uniform Resource Locator

42
Q

“Sometimes also referred to as an absolute domain name, it specifies its exact location in the tree hierarchy of the Domain Name System (DNS). It specifies all domain levels, including the top-level domain and the root zone. A fully qualified domain name is distinguished by its lack of ambiguity; it can be interpreted only in one way.”

A

Fully Qualified Domain Name

43
Q

“The part of a network address which identifies it as belonging to a particular domain.”

A

Domain name

44
Q

“A unique string of numbers separated by full stops that identifies each computer using the Internet Protocol to communicate over a network.”

A

IP address

45
Q

“The internet’s equivalent of a phone book. They maintain a directory of domain names and translate them to Internet Protocol (IP) addresses; this is necessary because, although domain names are easy for people to remember, computers or machines access websites based on IP addresses.”

A

Domain Name System

46
Q

“A computer application used in a network to prevent external users from gaining unauthorised access to a computer system.”

A

Firewall

47
Q

“A firewall technique used to control network access by monitoring outgoing and incoming packets and allowing them to pass or halt based on the source and destination Internet Protocol (IP) addresses, protocols and ports.”

A

Packet filtering

48
Q

“A dedicated computer or software system running on a computer that acts as an intermediary between an end-point device like a computer and another server from which a user or client is requesting a service.”

A

Proxy server

49
Q

“A firewall technology that monitors the state of active connections and uses this information to determine which network packets to allow through the firewall.”

A

Stateful packet inspection

50
Q

“The oldest and best-known encryption technique. A secret key, which can be a number, a word, or just a string of random letters, is applied to the text of a message to change the content in a particular way; this might be as simple as shifting each letter by several places in the alphabet.”

A

Symmetric encryption

51
Q

“This method of encryption involves using a pair of keys to encrypt and decrypt a message so that it arrives securely. Initially, a network user receives a public and private key pair from a certificate authority.”

A

Asymmetric encryption

52
Q

“Verifies that a user sending a message is who he or she claims to be, and provides the receiver with the means to encode a reply. An individual wishing to send an encrypted message applies for a digital certificate from a Certificate Authority (CA).”

A

Digital certificate

53
Q

“A digital code (generated and authenticated by public-key encryption) which is attached to an electronically transmitted document to verify its contents and the sender’s identity.”

A

Digital signature

54
Q

“Self-replicating virus that does not alter files but resides in active memory and duplicates itself. Worms use parts of an operating system that are automatic and usually invisible to the user. It is common for worms to be noticed only when their uncontrolled replication consumes system resources, slowing or halting other tasks.”

A

Worms

55
Q

“A program that appears harmless but is, in fact, malicious.”

A

Trojans

56
Q

“A piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.”

A

Virus