Summary Questions, Chapters 40-42 Flashcards

(67 cards)

1
Q

Firewall

A

Hardware or software protecting against unauthorised access to a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the two ways of creating a firewall?

A
  • packet filtering

* stateful inspection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is packet filtering?

A

A technique for examining the contents of packets on a network and rejecting them if they do not conform to certain rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is stateful inspection?

A

A technique for examining the contents of packets on a network and rejecting them if they do not form part of a recognised communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Why does routing through a proxy server increase security?

A

There is no direct connection between the computer on the LAN and the internet, so all requests are passed through the proxy server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is symmetric encryption?

A

Where the sender and receiver both use the same key to encrypt and decrypt data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is key exchange?

A

When the sender sends the encryption key to the receiver

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is asymmetric encryption?

A

When a public and private key are used to encrypt and decrypt data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a private key?

A

A code used to encrypt and decrypt data that is only known by one user, but is mathematically linked to a corresponding public key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a public key?

A

A code used to encrypt and decrypt data that can be made public and is linked to a corresponding private key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a digital certificate?

A

A method of ensuring that an encrypted message is from a trusted source as they have a certificate from a Certification Authority.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a Certification Authority?

A

A trusted organisation that provides digital certificates and signatures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a digital signature?

A

A method of ensuring that an encrypted message is from a trusted source as the have a unique, encrypted signature, verified by a Certification Authority.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a Trojan?

A

Malware that is hidden within another file on your computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a virus?

A

A generic term for malware where the program attaches itself to another file in order to infect a computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a worm?

A

Malware or type of virus that replicates itself and spreads around a computer system, but does not need to be attached to a file in order to infect a computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

List ways of reducing the risk of a virus entering your network.

A
  • firewall
  • keep OS up to date
  • encrypt data files
  • ensure requests are coming from recognised sources
  • keep anti-virus software up to date
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which type of encryption is more secure?

A

Asymmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is TCP/IP?

A

A set of protocols for all TCP/IP network transmissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are the four layers of TCP/IP?

A

Application, Transport, Internet, Link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the purpose of the Application Layer?

A

Handles Domain Name System and some protocols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is the purpose of the Transport Layer?

A

Ensures all packets have arrived and that there are no errors in them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is the purpose of the Internet Layer?

A

Defines IP addresses of devices that send and receive data, creates and routes packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is the purpose of the Link Layer?

A

Controls physical characteristics, provides synchronisation of devices, identifies network topology being used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What is a port?
An addressable location on a network that links to a process or application.
26
What is HTTP?
A protocol for transmitting and displaying web pages.
27
What is the client-server model?
A way of implementing a connection between computers where one computer (client) makes use of the resources of another (server).
28
Which protocols does HTTPS use?
Secure Socket Layer (SSL) and Transport Layer Security (TLS)
29
What is FTP?
A protocol for handling file uploads and downloads.
30
What is SSH?
A protocol for remote access to computers.
31
How does SSH improve connection security?
It creates a secure network of nodes.
32
Why must you use specific command words when using SSH?
It uses a command line interface.
33
What is SMTP protocol used for?
Sending emails
34
What is POP3 protocol used for?
Receiving emails
35
Which port does POP3 use?
Port 110
36
What is a web server?
A dedicated computer on a network for handling web content.
37
What is an email server?
A dedicated computer on a network for handling email.
38
What is a web browser?
An application for viewing web pages.
39
How does a web browser show a user web pages?
1. Sends URL 2. Translates URL to IP address 3. Returns to browser 4. Browser connects to web server using IP address 5. Web server sends web pages to browser
40
What does API stand for?
Application Program Interface
41
What is an API?
A set of subroutines that enable one program to interface with another program.
42
What is websocket protocol?
A set of rules that creates a persistent connection between two computers (client and server) on a network to enable real-time collaboration.
43
What are messages?
Packets of data transmitted using websocket protocol.
44
What is CRUD?
An acronym that explains the main functions of a database: Create, Read, Update, Delete
45
What does CRUD refer to?
The way in which data is actually displayed.
46
What does SQL stand for?
Standard Query Language
47
What is SQL?
A programming language used to manage data within a relational database.
48
What does REST stand for?
Representational State Transfer
49
What is REST?
A methodology for implementing a networked database.
50
What does HTTP stand for?
Hypertext Transfer Protocol
51
What is HTTP?
Protocol to define identification, request and transfer of multimedia content over the Internet.
52
What does JSON stand for?
JavaScript Object Notation
53
What is JSON?
A standard format for transmitting data.
54
What does XML stand for?
Extensible Markup Language
55
What is XML?
A method of implementing a database where a database is put into a server and various users can access it from their workstations.
56
What is a thin client?
A network where one computer contains most resources, processing power and storage capacity, which it distributes to other clients.
57
What is a thick client?
A network where resources, processing power and storage capacity are distributed between the server and the client computers.
58
What is a terminal?
A computer with little or no processing power or storage capacity, which is used as a client in a thin client network.
59
What are the advantages of a thin client network?
* Easy and cheap to set up new clients * Server can be configured to distribute all hardware and software resources needed * Hardware and software changes only need to be implemented on the server * Easier for network manager to control the clients * Greater security as clients have fewer access rights
60
What are the disadvantages of a thin client network?
* Clients are dependent on server, so if it goes down, all clients are affected * Can slow down with heavy use * May require greater bandwidth to cope with client request * High-specification servers are expensive
61
What are the advantages of a thick client network?
* Reduced pressure on the server leading to more uptime * Clients can store programs and data locally, giving them more control * Fewer servers and lower bandwidth can be used * Suitable for tablets and mobile phones that require more of the processing and storage to be done on the server side
62
What are the disadvantages of a thick client network?
* Reduced security if clients can download software or access the internet remotely * More difficult to manage and update * Data more likely to be lost or deleted on client side * Can be difficult to ensure data integrity
63
How does JSON compare to XML in terms of human readability?
Very easy to read as it is based on defining objects and values
64
How does JSON compare to XML in terms of how compact the code is?
Less code is created in JSON than XML.
65
How does JSON compare to XML in terms of parsing speed?
Quicker than XML as data is clearly defined as object and value.
66
How does JSON compare to XML in terms of ease of creation?
Easier to create as the syntax of the coding is easier.
67
How does JSON compare to XML in terms of flexibility and extenibility?
Works with a limited range of data types, which may not be sufficient for all applications.