Internet Flashcards

1
Q

Computer Worm

A

A computer worm is a malicious, self-replicating software program (malware) which affects the functions of software and hardware programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Ransomware

A

Ransomware is a type of malware program that infects and takes control of a system. It infects a computer with the intention of extorting money from its owner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Botnet

A

Botnet is a set of networks connected computers/devices that are used for malicious purposes. Each computer in a botnet is called Bot. It is also known as Zombie

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Trojan horse

A

It is a type of malware that presents itself as legitimate software. It may perform actions on a computer that is genuine but will install malware actions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

keylogger

A

A keylogger is a type of malware that stores all keystrokes of a computer. It can record all sorts of personal information, such as usernames, passwords, credit card numbers, and personal documents such as emails and reports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Rootkit

A

A rootkit is a secret computer program designed to provide continued access to a computer while actively hiding its presence. Rootkits are associated with malware such as Trojans, worms, viruses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Spyware

A

Spyware is a software that is installed on a computing device without the end user’s knowledge. It steals internet usage data and sensitive information such as usernames and passwords, activating the microphone or camera on a computer to record physical activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Adware

A

Adware is unwanted software designed to display advertisements on the computer screen to generate income. This type of ads cannot be removed easily

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Phishing

A

Phishing is a cyber-attack that used to steal user data, including login credentials and credit card numbers. They use email as a weapon and trick the email recipient into believing that the message is received from real companies such as banks, Amazon etc to harvest the recipient’s details. Email Phishing, Spear Phishing (targets special person/organization) are techniques of Phishing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

ARPANET

A

world’s first fully operational packet switching computer network,
developed by the Advanced Research Projects Agency of the U.S. Department of Defense in 1969. It connected with only four computers

ARPANET adopted TCP/IP in 1983 and the “network of networks” became the modern Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

World Wide Web

A

WWW is one of the services interconnected over the internet. It is a collection of all information, resources, pictures, sounds, multimedia on the internet which is formatted in HTML and accessed through HTTP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Web Server

A

A web server stores, processes and delivers web pages to the users. The intercommunication between users and servers is done using Hypertext Transfer Protocol (HTTP).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Web Page

A

It is a document written in HTML that can be accessed through the internet by using the web browser. It is identified by Uniform Resource Locator.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

(HTML)

A

Hypertext Mark-up Language

HTML is used to create web pages that are displayed on the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Hypertext Transfer Protocol (HTTP)

A

This protocol is used to transfer data over the web. It runs on top of the TCP/IP set of protocols. It uses a server-client model.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

TCP/IP

developed by

A

Transmission Control Protocol/Internet Protocol

t is a set of communication protocols which is used to access the internet. TCP/IP was developed by Bob Kahn and Vint Cerf in 1978.

17
Q

URL

A

Uniform Resource Locator

URL is used to locate the address of a resource and protocol.

18
Q

Domain Name

A

It serves as an address which is used to access the website. It can be universally understood by Web servers and online organizations

19
Q

DNS

A

Domain Name System

DNS translates domain names into IP addresses. It has a large database of domain names and its IP addresses

20
Q

two types of Transmission Media

A

Guided Media and

Unguided Media

21
Q

Guided Media/Bounded Media

A

The signals are transmitted through the narrow path which made by physical link

Coaxial Cable

22
Q

Unguided/Unbounded Media

A

The signals are transmitted without using any cables. This type of transmission is known as wireless communication. Radio waves, Infrared

23
Q

Switch

A

witch is a small hardware device that works at the layer of LAN (Local Area Network). It receives incoming data packets, filters the packet and sends only to the interface of the intended receiver

24
Q

Gateway

A

a network node that connects two dissimilar networks using different protocols together

25
Q

Firewal

A

A firewall is a network security system that monitors and controls overall incoming and outgoing network traffic based on advanced and a defined set of security rules

26
Q

difference in http and https

A

HTTP is unsecured while HTTPS is secured. HTTP sends data over port 80 while HTTPS uses port 443. HTTP operates at application layer, while HTTPS operates at transport layer. No SSL certificates are required for HTTP, with HTTPS it is required that you have an SSL certificate and it is signed by a CA