csp test 02/11/25

¡Supera tus tareas y exámenes ahora con Quizwiz!

characteristics of radio

-allows mobility -transmitted through towers -transmitted throgh routers -infastrucutre alr avialable(?)

used i public key encryption, it is scheme in which the key to encrypt data is different from the key to decrypt

asymmetric encryption

what are brute force attcks?

attakcs that use every possible solution in order to break in

what role do internet cookies play in web browsing

internet cookies are small data files that store user preferences and session information, allowing websites to remember users and enhance their browsing experience. This makes the first answer choice correct.

what type of key can be freely shared with anyone so that they can encrypt a messgae

public key

what is spywares purpose

secrely monitor and collect user info

what does the s in https stand for

secure

difference betwene worm and virus

virus needs host file while worm spread automatically

MAC address characteristics

-assigned by manyfactuerer -used for local network identifcaiton -unqiue to each network interface card -cannot be cahanged by user -fixed length of 48 bits -fixed, assigned to physical device -0D:0C:F5:09:56:98

characteristics of elecitry

-cheap -transmitted through ethernet cables -transmitted through power lines -short range(?)

charactersitics of udp

-doesnt keep track of lost packets -ideal for gaming -ideal for streaming services -ideal video broadcasts -faster transmission

characteristic of light

-fastest transfer type -expensive to set up -transmitted through subsea -no signal loss over long distance

why has ransom ware becme more prevalent in recent years

-increased use of outdated software -laack of awareness about cybersecruty -rise of cyrpcurrenu

characteristics of TCP

-requests lost data packets to be resent -reliable dtaa transfer -better used for web browsing -better for emailing -gaurantees order of packets -error checking and recovery -ideal for file transfers and downloads

IP address characteristics

-varies ased on network envionment -used to identify devices on a netowr -can be identified by 3rd parties -can change over time -assigned by internet service provider -150.60.122.98

what does a UNIFORM RESROUCE LOCATER specify?

A URL specifies the protocol (e.g., HTTP), the domain (e.g., www.example.com), and the path to a resource (e.g., /page). This combination allows users to access specific resources on the internet.

what is the primary purpose of redundancy in internet fault tolerence?

The primary purpose of redundancy in internet fault tolerance is to ensure data can be rerouted in case of a failure, maintaining network reliability and availability.

how do fiber optic cables trasmit data

Fiber optic cables transmit data by using light signals that travel through glass or plastic fibers. This method allows for high-speed data transmission over long distances, unlike electrical signals or radio waves.

compare IPv4 and Iv6 addresses in terms of their structure and capacity

IPv4 addresses are 32 bits long, allowing for about 4.3 billion unique addresses. In contrast, IPv6 addresses are 128 bits long, enabling a vastly larger address space, accommodating the growing number of devices on the internet.

an encyrption layer of HTTP that uses public key cryptography to establish a secture conection

SSl/TLS

what internet protocol is used to request and send pages and files on the world wide web

The HyperText Transfer Protocol (HTTP) is specifically designed for requesting and sending web pages and files on the World Wide Web, making it the correct choice among the options provided.

prpotocal that breaks down data into packets and addresses them with source and destination information

The Internet Protocol (IP) is responsible for breaking data into packets and addressing them with source and destination information, making it the correct choice. UDP and TCP are transport layer protocols, while HTTP is an application layer protocol.

which protocol is primary responsible for ensuring reliable data transmission over the internet?

The Transmission Control Protocol (TCP) is responsible for ensuring reliable data transmission by establishing a connection, error-checking, and guaranteeing the delivery of packets in the correct order, unlike UDP which is connectionless.

what protocol is used for time sensitive applications, and does not garantee data delivery

User Datagram Protocol (UDP) is designed for time-sensitive applications like video streaming and online gaming. It allows faster data transmission by not guaranteeing delivery, making it suitable for scenarios where speed is crucial.

pontential immpact of a btnet on a network's security and performance

botnets can slow down network performance and beused for coordinated attacks

process that revverses encryption, taking a secret message and reproducing the orginal plain text

decrption

process of ecoding messages to keep them secret so only authorized parties can read it

encryption

what is a symmetric key used for

encyrpting and decrpyting data

a mathematical operation that returns the remainder after a division equation

modulo

whats a common characteristic of a phising email?

offer too good to be true

what are small chunks of information sent around the internet?

packets. "Small Chunks" of binary information sent over the internet are called packets. They are the fundamental units of data transmission, allowing for efficient communication between devices.

what type of key is not shared and computers can decrypt a message with it

private Ket

what is spear phising

targeted attack aimed at a specific individual or organization

how does the internet achieve fault toelrance

The internet achieves fault tolerance by using redundant pathways for data transmission, allowing data to reroute in case of a failure. This ensures continuous connectivity, unlike the other options which do not enhance reliability.

advantages of fiber optic cabels

The primary advantage of fiber optic cables is that they offer higher bandwidth and faster data transmission speeds compared to other types of connections, making them ideal for high-speed internet access.

differnece between HTTP and HTTPS?

The primary difference is that HTTPS includes encryption for secure communication, protecting data during transmission, while HTTP does not provide this security, making it vulnerable to interception.

type of computer that forwards data accorss a network

A router is a device that forwards data packets between computer networks, making it the correct choice for the question. Other options like WiFi Station, Client, and DNS Server serve different functions in networking.

HOW LONG it takes a packet to travel from his computer to a wiipedia server

Andrew is measuring latency, which refers to the time it takes for a packet to travel from his computer to the server. Bandwidth measures data transfer capacity, while bit rate refers to the amount of data transmitted per second.

capacity of data transer in a system

Bandwidth refers to the maximum capacity of data transfer in a system, indicating how much data can be transmitted over a network in a given time. It is the correct choice compared to bitrate, latency, and 5G LTE.

what is the primary function of domain name system

The primary function of the Domain Name System (DNS) is to translate URLs into IP addresses, allowing users to access websites using easy-to-remember domain names instead of numerical IP addresses.


Conjuntos de estudio relacionados

Chapter 16-18 Honors U.S. History WHS

View Set

Lesson 6: Language Focus: Expressing Ideas Concisely - Practice (Unit 1) (1/2)

View Set

FIN 4010 Exam 2 - Conceptual Questions

View Set

Social change, Social movements, and Collective Behavior

View Set

Mechanics of Materials Chapters 1-5 Exam Review

View Set

Cardiac conduction and rhythm prepU

View Set