Internet and WWW Flashcards

1
Q

Difference between Internet and WWW? (1 mark)

A

World Wide Web is a collection of web pages and websites
Internet is an interconnected network for devices to communicate with each other

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is an URL ( 2 marks)

A
  • Uniform resource locator
  • It’s an unique address given to resources for identify the location of it on the Internet
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the URL made up of ( 5 marks)

A

Protocol : HTTP, HTTPS
host : www.
Domain name: example.org
Location: note-taking/template
File name: /index.html

==> http//www.example.org/note-taking/template/index.html

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a protocol? (1 mark)

A
  • It’s a set of rules that allows devices to communicate with each other
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How does HTTP or HTTPS works (3 marks)

A
  • It allows data to be sent between client and users
  • However, HTTP send the data in plain text ==> easy to be understood by hackers so HTTPS is a more secure version.
  • HTTPS uses SSL (secure socket layer) and TLS (transport layer security)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How does SSL and TLS works? (1 mark)

A
  • Secure socket layer and transport layer security use a combination of asymmetric and symmetrical encryption.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define web browser (1 mark)

A

Render HTML and display web pages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Other functions of web browsers ( 5 marks)

A
  • Cookies
  • Bookmarks
  • Render HTML
  • Record user history
  • Navigational tools
  • Address bars
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Describe how a web page is accessed and located ? (5 marks)

A
  • When an URL is typed in, it will be sent to the DNS (domain name system) via HTTP/HTTPS
  • The DNS will find the web page IP address and send back to the browser
  • The web browser will sent request access to the web page of the web server.
  • The security certificated are exchanged
  • The web browser will render the web pages and HTML
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the two types of cookies ( 2 marks)

A

Session and persistent cookies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Purposes of the two types of cookies ( 6 marks)

A

Session cookies:
+ shopping cart list
+ Display adverts
+ Personal information
Persistent cookies:
+ login details
+ User preferences
+ pages that the users have already visited

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is digital currency ( 2 marks)

A

Exists in digital forms and doesn’t go through central banks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does a blockchain contain ? ( 5 marks)

A
  • Hash value
  • Previous hash value
  • Sequence number
  • Transaction data
  • Timestamp
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How does blockchain work? (4 marks)

A
  • Blockchain a digital ledger ==> record at every timestamp
  • Each block will have its own hash value( a unique number by an algorithm given to each block) and the hash value of the previous block.
  • So if the hash value is changed in any block, it will affect the whole blockchain and the whole blockchain will need to be recalcuated.
  • The copy of the blockchain is sent to everyone for authencity.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Define brute-force attack (1 mark)

A
  • Trying every combinations of the passwords manually or using a program until getting access into user’s accounts
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Define data interception ( 2 marks)

A
  • Interfering with the transmission of data to gain unauthorized access to the user’s data.
  • It used a sniffer
17
Q

Define DDoS attack (3 marks)

A
  • The perpetrator will send fake links to user’s computers to turn them into bots, creating a botnet
  • The botnet will flood the server with lots of requests AT THE SAME TIME which cause latency.
  • Therefore, legit computers can’t access the server.
18
Q

Reasons for DDoS attack ( 3 marks)

A
  • Ransom money
  • Revenge
  • Entertainment
19
Q

Define social engineering ( 1 mark)

A
  • Decieving people into giving out their personal information
20
Q

Examples of social engineering

A
  • Phishing: Contains a fake website by disguising as trustworthy company
  • Pharming: Redirect users into fake website by a malware downloaded into the computer
21
Q

Name all the malware :D (6 marks)

A
  • Virus
  • Trojan
  • Worm
  • Spyware
  • Adware
  • Ransomware
22
Q

Name the functions of all of these malware:
- Virus
- Trojan
- Worm
- Spyware
- Adware
- Ransomware

A
  • Virus: replicate itself to corrupt files
  • Trojan: Disguised as harmless file ==> release other malware
  • Worm: replicate itself to take up bandwidth ==> causing lag
  • Spyware: to record user’s inputs secretly on hardware
  • Adware: to create pop-ups
  • Ransomware: encrypt data and request ransom money for decrypting it
23
Q

Define access levels (1 mark)

A

-Restrict sensitive information to authorized people
Ex:
Edit, open, delete file (full access)
Open file (read-only access)
nothing ( no access)

24
Q

Define anti-malware ( 2 marks)

A
  • Scan through all the files to detect malware and remove the malware
  • If a malware is found, it will be isolated and be removed.
25
Q

Define authentication (2 marks)

A
  • Biometrics : use physical characteristics of humans (fingerprint)
  • Two-factor authentication
26
Q

Define firewalls (3 marks)

A
  • Firewall acts as a barrier between the user computer.
  • It will compare the value of the data entering or leaving with its pre-defined criteria.
  • It will accept or reject the data and notify the user
27
Q

Define proxy layers( 2 marks)

A
  • Eliminating web traffic by set criteria
  • Hides user’s IP addresses and location ==> harder to trace back to the user
28
Q

Define SSL (2 marks)

A
  • Encrypt data
  • Send security certificates ==> avoid interception
29
Q

Define software updates purpose

A
  • To patch up loopholes in the security system
  • Allow antil-malware system to keep updating