Test 1 Flashcards

1
Q

the amount of data that can be carried over a data network or connection in a fixed amount of time; higher=more data, expressed in bps

A

bandwidth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

a network of zombie computers that can be remotely controlled by a hacker

A

botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

the act of using social media to create fake profiles, especially for the purpose of luring unsuspecting victims into online relationships

A

catfishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

a protocol in which a _____ server assigns IP addresses to computers when they join a network. computer’s IP is not fixed, but can be different every time a computer joins the network

A

DHCP (dynamic host configuration protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

a system for mapping human-friendly names to numeric IP addresses. DNS translates the name into the corresponding IP address. like directory assistance for the internet

A

DNS (domain name system)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

an incident in which a user or organization is deprived of the services of a resource that they would normally expect to have. can target a person or company and are costly. can be politically motivated.

A

DoS (Denial of Service attack)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

computer becomes infected just by visiting a website which contains malicious code, vulnerable servers are searched for. cybercriminals inject their malicious code onto web pages. affects if you are unpatched

A

drive by download

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

the number of legs (or hops) a particular packet takes as it moves from its source to its destination. aka number of routers a packet passes through on its journey

A

hop count

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

protocol for moving hypertext files and other info across the internet, requires browser on one end and web server on the other. uses tcp/ip services and is most important protocol for world wide web

A

http (hypertext transfer protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

standard internet protocol that routes data packets across multiple nodes and networks on a best effort basis and is unreliable

A

IP (internet protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

standard way of identifying a computer that is connected to the internet

A

IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

hijacking and fraudulent use of another person’s personal information without that person’s knowledge

A

identity theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

the amount of time it takes for a packet of data to get across a network from one point to another

A

network latency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

a unit of data sent across a network, contains destination address, sender’s address, error-control info, and data. layout determined by protocol

A

packet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

use of counterfeit emals and fraudulent websites to fool recipients into disclosing personal financial data such as credit card numbers, usernames and passwords, and social security numbers

A

phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

standard set of rules that govern how computers and electronics communicate with one another, define a messages format and how they are exchanged

A

protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

intermediate server that sits between clients and the servers those clients use. accepts requests from clients and transmits those requests to the server. prevents clients from accessing prohibited servers, etc.

A

proxy server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

kind of extortion via software, in which a Trojan horse running on a computer will encrypt some files, only to be returned for money

A

ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

software that hides the real screen of a computer to conceal the presence of other intrusive software. may hide some data so its not visible to the user

A

rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

device that interconnects multiple computer networks, read the address info on data packets, which are then forwarded in the appropriate direction. assoc. with IP

A

router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

malware that preys on naïve users, usually reports some nonexistent problem and convinces user to buy a software to “fix” it

A

scareware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

gaining access to systems or data by exploiting human psychology, rather than hacking

A

social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

unsolicited junk messages, typically email, sent indiscriminately to many users at once

A

spam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

a particular, designated victim or organization is targeted with an email customized for them, based on information the sender has gathered

A

spear phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
software that gathers information about a computer user and then transmits this info to an external entity without the knowledge or informed consent of the user
spyware
26
standard internet protocol that converts messages into streams of packets at the source, and reassembles streams of packets
TCP (transmission control protocol)
27
deceptive program that is presented as somewhat desirable, but is actually destructive with a malicious function
Trojan horse
28
computer program that can reproduce by changing other programs to include a copy of itself. parasite program (needs another program to survive). requires a person/human contact to spread it
virus
29
software program capable of reproducing itself and spreads automatically from one computer to the next over a network, generally taking advantage of security flaws. can spread once in a network without further human interaction
worm
30
computer attached to the internet that has been comprised by a computer virus or Trojan horse so that it performs malicious tasks directed by the hacker. owners of these computers are often unaware it is even infected
zombie
31
transforms infinites set of values to a finite set. sample analog input signals and convert to digital output signal. series of numbers representing the amplitude of the original signal as measured periodically (quantizing)
analog to digital converter
32
world wide standard for the code numbers used by computers to represent all characters
ASCII (American standard code for information exchange)
33
device or program that protects a network or individual computer from unauthorized external users. blocks certain types of traffic
firewall
34
standard language for creating webpages
html
35
company that sells access to the internet
ISP (internet service provider)
36
connects computer in a relatively small area
LAN (local area network)
37
control information on a packet needed by the network to deliver the user data
packet header
38
data transmission method in which data is transmitted in packets through a network to a remote location
packet switching
39
a set of up to 256 colors used in an image
palette
40
often referred to as a dot, "dots per inch" short for picture element. make up an image
pixel
41
connection point or interface and an external device
port
42
process of limiting a value to one of a fixed number of values
quantization
43
field in a packet header for some protocols, identifying the data contained in the payload
sequence number
44
universal character set or wide-body ASCII that can represent all the characters in the world's written languages
unicode
45
global address for documents and other resources on the world wide web. first part indicates what protocol to use, second part indicates the IP address or domain name
URL (uniform resource locator)
46
a computer network covering a large geographical area usually interconnecting two or more LANs
WAN (wide area network)
47
abbrev. dns
domain name system
48
abbrev. http
hypertext transfer protocol
49
abbrev. ip
internet protocol
50
abbrev. isp
internet service protocol
51
abbrev. LAN
local area network
52
abbrev. RFC
request for comment
53
abbrev. tcp
transmission control protocol
54
abbrev. URL
uniform resource locator
55
how many bits in a kilobyte
8x1024
56
what is a socket
ip address+tcp port computer to program connection you use
57
internet vs. world wide web?
the internet is a collection of connected networks that can communicate with each other using TCP/IP, while the world wide web is a global web of linked information in various formats. its built using services of the internet, but those services are also used for separate things (email, voiceover). primary protocol of the web is HTTP
58
format of an IP address?
x.x.x.x where x is a number between 0 and 255
59
what type of images should use jpeg?
photos, images with complex color schemes
60
what type of images should use gif?
line art, images with large areas of single color
61
cookies: what creates? when created? where saved? when sent from browser to web server?
created by web server created when you visit a webpage saved in browser sent from browser to web server when you visit the site again
62
virus vs. worm
worms do not need anymore human interaction to spread once they have infected a network (it spreads automatically). viruses require people to spread them (not on purpose)
63
zombie computer: what is it? how does it get this way? how is it controlled? what can it be used for?
it is a computer that has been compromised by malware that performs various malicious tasks it is infected by a virus or Trojan horse to get this way it is controlled by the hacker it can be used for dos attacks or sending a spam email
64
3 components of the google search and explanation
the crawl: reads all the web pages it can find and follows links from those pages to find others the index: builds a database of the contents of those pages the query processor: when a user submits a request, it used the info in the index and a complex set of rules to construct the best response
65
responsibilities of client vs. server
client: handle user interface, translates requests into protocol, send request to server, wait, translate response into readable results, present them server: listen for client's request, process it, return results back to the client, maintain secure and important information
66
ip vs tcp vs http
ip: unreliable, sees that packets are routed across multiple nodes and networks tcp: reliable, uses ip, converts messages into streams of packets at the source, then reassembles them into messages at the destination http: uses tcp/ip to move hypertext files and other info across the internet.
67
how is an image turned into a set of numbers -how does # of pixels and colors used affect: A) # of bytes B) how closely the actual image is represented in the digital representation
the image is divided into pixels, which each get assigned a solid color which requires 3 bytes (each color has a number) or use a palette (256 colors in each, each pixel requires one byte). A) more colors used means more bytes, 3 bytes per pixel, but if a palette of colors is used then only one byte is required for each pixel. B) not enough colors in the palette-won't match the original picture close enough, not enough pixels-will be able to see each individual pixel, the picture won't be sharp enough
68
how can tcp reliably deliver a message over an unreliable ip network
when the large message is broken up into packets, these packets are numbered and sent. -received packets are acknowledged -unacknowledged packets are resent -duplicate packets are discarded at the destination the packets are reassembled into the original message
69
describe the Melissa virus: how did it work? how was it spread? what made it so effective?
the Melissa virus was sent via email