1/75
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
What is the Internet
A network of networks that connects millions of systems worldwide
What is an ISP
A firm that provides access to the Internet
What is a URL
A Uniform Resource Locator that identifies an Internet resource and the protocol needed to retrieve it
What is a protocol
A set of rules that defines how data is formatted and exchanged
What is HTTP
A protocol that allows web browsers and web servers to communicate
What is FTP
A protocol used to copy files from one computer to another
What is SMTP
Simple Mail Transfer Protocol used for email transfer
What is SSL
A security standard that creates an encrypted link between a browser and a web server
What does HTTPS indicate
That SSL is being used to secure communication
What is load balancing
Distributing workload across multiple systems to avoid congestion and slow performance
What is fault tolerance
The ability of a system to keep operating even if a component fails
What is a domain name registrar
A firm that lets users register domain names
What is web hosting
A service that provides servers and hardware to run websites
What is an IP address
A numerical address used to identify a device on the Internet
What is NAT
Network Address Translation that conserves IP addresses by mapping many private devices to one Internet-facing device
What is IPv6
A newer IP scheme with a much larger address space than IPv4
What is DNS
The Internet directory service that matches names like domains to IP addresses
What is cache in networking
Temporary storage used to speed up computing tasks
What is DNS cache poisoning
An attack that redirects users to fraudulent sites by exploiting DNS weaknesses
What is TCP
Transmission Control Protocol that ensures a perfect copy of a message is sent
What is a packet
A unit of data forwarded by a network
What is IP in TCP/IP
Internet Protocol that routes packets across networks
What is a router
A device that connects networks and exchanges data between them
What is UDP
User Datagram Protocol used when speed matters more than perfect delivery
What is VoIP
Voice communication transmitted over the Internet or private packet-switched networks
What is peering
When separate ISPs connect their networks to exchange Internet traffic
What is a colocation facility
A site where multiple firms place equipment and connect to high-speed Internet infrastructure
What is the last mile
The technologies that connect end users to the Internet
What is the Internet backbone
High-speed data lines that form the core of the Internet
What is Amdahl’s Law
The idea that a system’s speed is limited by its slowest component
What is broadband
High-speed Internet access
What is bandwidth
Network transmission speed measured in bits per second
What is traceroute
A tool that shows the path packets take to reach a destination
What is FTTH
Fibre to the home broadband delivered through fibre-optic cables
What is wireless spectrum
Electromagnetic frequencies used for wireless communication
What is LTE
A 4G mobile network standard for faster and more reliable wireless service
What is a security breach
A compromise of information systems or data through theft, disruption, or unauthorised access
What is identity theft
The misuse of someone’s personal information for fraud
What is business email compromise
A scam that uses deceptive email to trick victims into transferring money or sensitive information
What is a botnet
A remotely controlled network of infected computers used for malicious activity
What is a DDoS attack
An attack that overwhelms a site or service with massive amounts of traffic
What is cyberwarfare
The use of malicious code or digital attacks to damage another nation’s systems or infrastructure
What is a hacker
Someone who either breaks into computers or is an especially skilled programmer
What is the difference between white hat and black hat hackers
White hats find weaknesses ethically, while black hats exploit them for personal gain
What is a hacktivist
A protester who uses hacking to make a political point
What is social engineering
Tricking people into revealing information or taking harmful actions
What is phishing
A technology-based con to steal sensitive information or install malicious software
What does spoofed mean
Altered to disguise the true origin or identity of an email or packet
What is a zero-day exploit
A new attack not yet recognised by security systems
What is biometrics
The use of body characteristics for identification or authentication
What is multi-factor authentication
Proving identity with more than one credential
What is the difference between a virus, worm, and trojan
A virus infects files, a worm spreads automatically, and a trojan disguises itself as legitimate software
What is spyware
Malware that monitors user actions or scans for sensitive information
What is a keylogger
Malware that records keystrokes
What is ransomware
Malware that encrypts files and demands payment to restore access
What is SQL injection
An attack that exploits poor input validation in software
What is cross-site scripting
An attack that injects malicious scripts into web content
What is buffer overflow
A vulnerability caused by writing more data than a buffer can handle
What is dumpster diving
Searching trash for valuable or sensitive information
What is shoulder surfing
Stealing information by watching someone directly
What is eavesdropping
Listening to or recording conversations, transmissions, or keystrokes
What is the dark web
A part of the Internet accessible only through special software and protocols such as Tor
What is the deep web
Internet content not indexed by search engines, often behind logins or paywalls
What is encryption
Scrambling data using a code so only authorised parties can read it
What is a key in encryption
The code used to unlock encrypted data
What is a brute-force attack
Trying all possible password combinations to break into an account
What is public key encryption
A two-key system used to secure electronic transmissions
What is a certificate authority
A trusted third party that authenticates public key encryption
What is ISO 27000
A family of standards for establishing and improving an information security management system
What is SIEM
Security Information and Event Management that collects and analyses security data across an organisation
What is a firewall
A tool that controls network traffic and blocks unauthorised access
What is an IDS
Intrusion Detection System that monitors for hacking attempts
What is a honeypot
A fake target designed to lure attackers
What is a patch
A software update that fixes known security holes
What is a whitelist
A security approach that allows only approved entities or actions
What is a blacklist
A security approach that blocks specified entities or actions