Information Systems Lecture Overview

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall with Kai
GameKnowt Play
New
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/16

flashcard set

Earn XP

Description and Tags

This set of flashcards covers the fundamental concepts and protocols associated with Information Systems, particularly focusing on networking protocols like TCP/IP, UDP, ICMP, ARP, and encryption methods.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

17 Terms

1
New cards

What is TCP/IP?

A suite of protocols including TCP, IP, UDP, ARP, and others.

2
New cards

What does the Transport layer protocol add at Layer 4 of TCP/IP?

A header that includes a port number to identify the receiving application.

3
New cards

What is the function of the Network layer in TCP/IP?

It adds its own header to the data and becomes a packet.

4
New cards

What is the characteristic of TCP that ensures connection establishment?

Connection-oriented, using a three-way handshake.

5
New cards

What is a three-way handshake in TCP?

Step 1: Request for connection (SYN); Step 2: Response to request (SYN/ACK); Step 3: Connection established (ACK).

6
New cards

What is UDP?

An unreliable, connectionless protocol that does not guarantee delivery of data.

7
New cards

What is one advantage of UDP over TCP?

UDP is more efficient, especially for real-time applications like audio or video.

8
New cards

What are the key roles of the Internet Protocol (IP)?

It identifies data's source and destination addresses and enables communication across multiple networks.

9
New cards

How does an ARP protocol work in an IPv4 network?

It discovers the MAC address of a host on the local network and maps IP addresses to MAC addresses.

10
New cards

What does a VPN do?

Creates a secure connection encrypted from end to end, often referred to as a tunnel.

11
New cards

What is the purpose of ICMP?

Reports on network health, indicating congestion, delivery failures, and transmission issues.

12
New cards

What does the CIA triad in information security stand for?

Confidentiality, Integrity, and Availability.

13
New cards

What is symmetric encryption?

Data encrypted using a single key known only by the sender and receiver.

14
New cards

What distinguishes asymmetric encryption?

It uses two keys: a private key known only to the user and a public key that anyone can request.

15
New cards

What is the role of a VPN concentrator?

Authenticates VPN clients, establishes tunnels, and manages encryption for VPN connections.

16
New cards

What does the 'netstat' command do?

Displays TCP/IP statistics and details about TCP/IP components and connections on a host.

17
New cards

What is the primary function of TLS/SSL?

To encrypt TCP/IP transmissions, including web pages and data entered into web forms.