Definitions networks Flashcards

1
Q

HTTP

A

Hypertext Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

FTP

A

File transfer protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

SMTP

A

Simple mail transfer protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

POP

A

Post office Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

VOIP

A

Voice over internet protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

IP

A

Internet Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

TCP

A

Transmission control protocol - one of the main protocols in the set of protocols used on the internet. TCP allows two computers to establish a connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Bandwidth

A

Bandwidth measures the amount of data that can transfer through a communications channel over a given period of time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

asynchronous

A

A form of data exchange which is irregular. Most exchanges of data over a network are asynchronous.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

WAP

A

wireless access point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

MAC

A

media access control address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

DNS

A

domain name server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Brute force attacks

A

A trail and error method of attempting passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Denial of service attacks

A

Flooding the server with so much traffic it is unable to process legitimate requests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Data interception

A

getting information when it is being sent through a cable or the air

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SQL injection

A

hacking technique to view or change a database by inserting a SQL code instead of data

17
Q

Penetrating testing

A

Testing to check security and to find vulnerabilities in a system

18
Q

synchronous

A

In computing this contrasts with asynchronous. This means that exchanges of data are regular.

19
Q

HTML

A

Hyper Text Mark-up Language. The language used to write and display web page documents.

20
Q

UDP

A

User datagram protocol

21
Q

Captcha

A

to see if the user is robot or human. e.g., a blurry set of numbers or letters

22
Q

SQL

A

structured query language

23
Q

SQL (structured query language) injection

A

used to read and manipulate the contents of databases, enter an SQL command into a publicly accessible program.

24
Q

Virtual networks

A

network of geographically unrelated and the computer are connected through the internet.

25
Q

coaxial

A

bulkier than UTP and less convenient to install

26
Q

fibre optic

A

Extremely thin strands of flexible glass

27
Q

Blagging

A

tricking a person into handing over info. E.g pretending to be an it guy and asking for a password.

28
Q

Phishing

A

sending a link through e-mail or social media, then takes them to a fake similar site, when passwords and usernames are inputted, they are stolen.

29
Q

Pharming

A

user is tricked into entering confidential data, does not need the user to click on a link, user is re-directed from putting in the right URL.

30
Q

Shouldering

A

looking over a person’s shoulder to see their password, good for a weak password.

31
Q

Network and user policy

A

what a network users can and cannot. E.g., password complexity, list of websites and other services can access, Guidance on e-mail attachments.

32
Q

ISP

A

internet service provider

33
Q

NIC

A

network interface controller

34
Q

VPN

A

virtual private network