BM6 Flashcards

(52 cards)

1
Q

What is the core mechanism of Packet Switching?

A

Messages are split into packets that travel along independent network paths, with routers using the destination IP address to determine the next link.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the function of the Network (IP) Layer in the TCP/IP stack?

A

It moves IP packets (datagrams) between hosts and routers across the internet, adding or removing source and destination IP addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the primary role of the Transport Layer (TCP)?

A

It establishes a reliable, two-way channel (pipe) between applications on two hosts, guaranteeing message delivery and correct reassembly order.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a TCP/IP Socket?

A

It is one endpoint of a two-way communication link between two network programs, uniquely identified by a combination of an IP address and a port number.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the TCP 3-way Handshake used for?

A

It is a sequence of messages (SYN, ACK) used by the TCP protocol to reliably establish a connection between the client and server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are Well-Known Ports (System Ports)?

A

Port numbers in the range 0-1023 assigned permanently by IANA to standard services (e.g., HTTP uses 80, SMTP uses 25).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are Client Ports (Dynamic/Ephemeral Ports)?

A

Temporary port numbers (49152-65535) allocated by the TCP layer to identify the client application process during a connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the role of the Application Layer?

A

It provides the interface for running programs (processes) to exchange messages using specific application-layer protocols (e.g., HTTP, FTP).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which protocol is used for sending email?

A

SMTP (Simple Mail Transfer Protocol), which transfers the message text from the client to a mail server listening on port 25.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which protocol is used for retrieving email?

A

POP3 (Post Office Protocol version 3), which uses port 110 to retrieve stored mail from the destination mail server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How do clients securely request web pages?

A

Using HTTPS (Hypertext Transfer Protocol Secure), which uses the SSL/TLS layer to encrypt requests and responses, typically communicating via port 443.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What protocol enables secure remote administration?

A

SSH (Secure Shell) provides an encrypted channel for remote command execution and login over an unsecured network, typically using port 22.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is FTP (File Transfer Protocol) primarily used for?

A

It is an application layer protocol used for copying files between a client host and a server host, typically using port 21 for commands and port 20 for data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the main function of the Network (IP) Layer?

A

It moves IP-layer packets (datagrams) between hosts and routers, using IP addresses to determine routing across the internet, providing best-effort delivery.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the function of the Link Layer?

A

It handles the physical interface details (cable or wireless), adding source and destination hardware addresses (MAC addresses) to packets before transferring bits onto the physical medium.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How is a conceptual IPv4 address divided?

A

It is split into a prefix (Network ID) and a suffix (Host ID).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the two current IP address standards and why was one introduced?

A

IPv4 (32-bit) and IPv6 (128-bit); IPv6 was introduced to solve the problem of eventually running out of available IPv4 addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the purpose of the Subnet Mask?

A

The subnet mask defines the number of bits in the prefix (Network ID) of an IP address, enabling a computer or router to determine the address of its local subnet via a bitwise AND operation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the difference between a Public and Private IP address?

A

Public IP addresses are globally unique and routable on the Internet; Private IP addresses are reserved for internal LANs and are non-routable across the public Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the role of a MAC Address?

A

It is the physical, globally unique 48-bit hardware address of the network adapter, used by the Link Layer for addressing within a local hop.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Do MAC addresses change as a packet crosses the Internet?

A

Yes, the hardware source and destination addresses change for each hop between directly connected hosts or routers.

22
Q

What is the primary purpose of the DHCP system?

A

It automates host setup by dynamically assigning temporary or permanent IP addresses and delivering essential host configuration parameters (like subnet mask and gateway address).

23
Q

Why do networks often use Private IP addresses and NAT?

A

Due to the scarcity of IPv4 addresses, NAT (Network Address Translation) allows a local network using non-routable private addresses to connect to the Internet using only a single routable public IP address.

24
Q

What is the purpose of Network Address Translation (NAT)?

A

NAT solves the shortage of IPv4 addresses by allowing devices with non-routable private IP addresses to access the public Internet via a single public IP address assigned to the router.

25
How does a NAT-enabled router facilitate communication outside the LAN?
The router acts as a single device with a single globally unique IP address, hiding the internal addressing details of the private network (LAN) from the outside world.
26
What is a thick-client workstation?
A computer/workstation with non-volatile local storage (HDD/SSD) that stores and runs its own operating system and applications locally.
27
What defines a thin-client workstation?
A diskless workstation with low specifications (little RAM, low CPU) that loads its operating system and runs applications centrally from a dedicated server.
28
What is the primary maintenance advantage of thin-client computing?
It offers a single point of control for patches/updates and installation of new applications on the server, minimizing the software maintenance overhead compared to thick clients.
29
How do peer-to-peer (P2P) networks operate?
There is an always-on server that services requests from numerous clients, and clients typically do not communicate directly with each other.
30
What is the primary role of APIs (Application Programming Interfaces)?
APIs establish communication interfaces, such as the Websocket protocol API, which creates a persistent, full-duplex TCP connection allowing both client and server to send data simultaneously.
31
How does REST map HTTP methods to database operations (CRUD)?
REST methods map onto CRUD operations (Create, Retrieve, Update, Delete), converting HTTP verbs like GET to SELECT (retrieve) or POST to INSERT (create).
32
What are the primary risks associated with Worms and Viruses?
These are types of malicious software (malware) that are self-replicating and exploit vulnerabilities in code to spread, potentially creating backdoors or launching botnets
33
How does a Trojan typically gain access to a computer system?
A Trojan is malicious software often disguised as legitimate software, and users are typically tricked into loading and executing it.
34
How does a worm spread through a network?
Worms are self-contained programs that replicate themselves by exploiting a vulnerability in a running network application program, often without requiring explicit user interaction
35
What defines a brute-force attack against a cipher like Caesar?
It is an attack that relies on attempting all possible keys until the plaintext is discovered; this is effective against systems (like the Caesar cipher) where the number of possible keys is too small.
36
What is the goal of a Social Engineering attack?
Attackers use social engineering to gain a user's trust, enabling them to steal sensitive information or dupe the user into downloading or executing malware.
37
What core programming vulnerability is often exploited by worms and viruses?
Attackers often exploit vulnerabilities in code, including defects or design flaws, in order to get a computer to execute their malicious software.
38
How does a firewall use stateful inspection to prevent data interception/attacks?
If a firewall performs stateful inspection, it tracks active TCP connections and uses this connection information to determine if incoming packets are legitimate parts of an ongoing dialogue or bogus attempts, blocking packets that do not match.
39
What capability of an application or operating system is necessary for a successful virus infection?
Viruses require some form of user interaction to infect a computer, as they are malicious software attached to another file (such as an email attachment) which the user must be tricked into opening.
40
What is a Queue and its core principle?
A dynamic, ordered data structure following the FIFO (First In First Out) principle, where items are added at the rear and removed from the front.
41
What are the primary operations on a Queue?
Enqueue (add item to rear), Dequeue (remove item from front), Peek or Top (examine the front item without removal), Is Empty, and Is Full.
42
What is a Priority Queue?
Items are ordered by an internal priority value; the item with the highest priority is removed first, overriding the FIFO principle (unless priorities are equal).
43
What is a Stack and its core principle?
A dynamic, ordered data structure following the LIFO (Last In First Out) principle, where additions (Push) and removals (Pop) occur only at the top.
44
What is the purpose of the Call Stack in programming?
For Depth-First Traversal of graphs/trees, handling subroutine calls (call stack), and evaluating arithmetic expressions in Reverse Polish Notation (RPN).
45
What defines a Graph?
A structure composed of Vertices (nodes) and Edges (arcs) that represent relationships, characterized by having no inherent root and potentially allowing loops.
46
How does a Graph differ from a Tree?
A tree is a connected, undirected graph with no cycles; trees often define hierarchical parent-child relationships, which graphs do not inherently require.
47
How are Graphs commonly represented in computer memory?
Using an Adjacency List (often dictionaries/hash tables) or an Adjacency Matrix (two-dimensional array).
48
What is the goal of Depth-First Traversal (DFT)?
To traverse the graph by exploring along each branch as far as possible before backtracking; typically implemented using a Stack data structure.
49
What is the goal of Breadth-First Traversal (BFT)?
To traverse the graph by visiting all neighboring vertices level by level; this method is used to find the shortest path (in terms of edges) and requires a Queue.
50
What is Recursion?
A computational method where a function or procedure is defined in terms of itself; it solves a problem by continually moving toward a simpler case.
51
What is the role of the Base Case in recursion?
It is the easiest form of the problem that stops the recursive process and returns a non-recursive solution, preventing an infinite loop.
52
Why is the Call Stack crucial for recursion?
The call stack tracks nested calls by storing the return addresses and local variables for each recursive instance until the Base Case causes the stack to unwind.