MIS 4

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/75

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 11:01 PM on 4/16/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

76 Terms

1
New cards

What is the Internet

A network of networks that connects millions of systems worldwide

2
New cards

What is an ISP

A firm that provides access to the Internet

3
New cards

What is a URL

A Uniform Resource Locator that identifies an Internet resource and the protocol needed to retrieve it

4
New cards

What is a protocol

A set of rules that defines how data is formatted and exchanged

5
New cards

What is HTTP

A protocol that allows web browsers and web servers to communicate

6
New cards

What is FTP

A protocol used to copy files from one computer to another

7
New cards

What is SMTP

Simple Mail Transfer Protocol used for email transfer

8
New cards

What is SSL

A security standard that creates an encrypted link between a browser and a web server

9
New cards

What does HTTPS indicate

That SSL is being used to secure communication

10
New cards

What is load balancing

Distributing workload across multiple systems to avoid congestion and slow performance

11
New cards

What is fault tolerance

The ability of a system to keep operating even if a component fails

12
New cards

What is a domain name registrar

A firm that lets users register domain names

13
New cards

What is web hosting

A service that provides servers and hardware to run websites

14
New cards

What is an IP address

A numerical address used to identify a device on the Internet

15
New cards

What is NAT

Network Address Translation that conserves IP addresses by mapping many private devices to one Internet-facing device

16
New cards

What is IPv6

A newer IP scheme with a much larger address space than IPv4

17
New cards

What is DNS

The Internet directory service that matches names like domains to IP addresses

18
New cards

What is cache in networking

Temporary storage used to speed up computing tasks

19
New cards

What is DNS cache poisoning

An attack that redirects users to fraudulent sites by exploiting DNS weaknesses

20
New cards

What is TCP

Transmission Control Protocol that ensures a perfect copy of a message is sent

21
New cards

What is a packet

A unit of data forwarded by a network

22
New cards

What is IP in TCP/IP

Internet Protocol that routes packets across networks

23
New cards

What is a router

A device that connects networks and exchanges data between them

24
New cards

What is UDP

User Datagram Protocol used when speed matters more than perfect delivery

25
New cards

What is VoIP

Voice communication transmitted over the Internet or private packet-switched networks

26
New cards

What is peering

When separate ISPs connect their networks to exchange Internet traffic

27
New cards

What is a colocation facility

A site where multiple firms place equipment and connect to high-speed Internet infrastructure

28
New cards

What is the last mile

The technologies that connect end users to the Internet

29
New cards

What is the Internet backbone

High-speed data lines that form the core of the Internet

30
New cards

What is Amdahl’s Law

The idea that a system’s speed is limited by its slowest component

31
New cards

What is broadband

High-speed Internet access

32
New cards

What is bandwidth

Network transmission speed measured in bits per second

33
New cards

What is traceroute

A tool that shows the path packets take to reach a destination

34
New cards

What is FTTH

Fibre to the home broadband delivered through fibre-optic cables

35
New cards

What is wireless spectrum

Electromagnetic frequencies used for wireless communication

36
New cards

What is LTE

A 4G mobile network standard for faster and more reliable wireless service

37
New cards

What is a security breach

A compromise of information systems or data through theft, disruption, or unauthorised access

38
New cards

What is identity theft

The misuse of someone’s personal information for fraud

39
New cards

What is business email compromise

A scam that uses deceptive email to trick victims into transferring money or sensitive information

40
New cards

What is a botnet

A remotely controlled network of infected computers used for malicious activity

41
New cards

What is a DDoS attack

An attack that overwhelms a site or service with massive amounts of traffic

42
New cards

What is cyberwarfare

The use of malicious code or digital attacks to damage another nation’s systems or infrastructure

43
New cards

What is a hacker

Someone who either breaks into computers or is an especially skilled programmer

44
New cards

What is the difference between white hat and black hat hackers

White hats find weaknesses ethically, while black hats exploit them for personal gain

45
New cards

What is a hacktivist

A protester who uses hacking to make a political point

46
New cards

What is social engineering

Tricking people into revealing information or taking harmful actions

47
New cards

What is phishing

A technology-based con to steal sensitive information or install malicious software

48
New cards

What does spoofed mean

Altered to disguise the true origin or identity of an email or packet

49
New cards

What is a zero-day exploit

A new attack not yet recognised by security systems

50
New cards

What is biometrics

The use of body characteristics for identification or authentication

51
New cards

What is multi-factor authentication

Proving identity with more than one credential

52
New cards

What is the difference between a virus, worm, and trojan

A virus infects files, a worm spreads automatically, and a trojan disguises itself as legitimate software

53
New cards

What is spyware

Malware that monitors user actions or scans for sensitive information

54
New cards

What is a keylogger

Malware that records keystrokes

55
New cards

What is ransomware

Malware that encrypts files and demands payment to restore access

56
New cards

What is SQL injection

An attack that exploits poor input validation in software

57
New cards

What is cross-site scripting

An attack that injects malicious scripts into web content

58
New cards

What is buffer overflow

A vulnerability caused by writing more data than a buffer can handle

59
New cards

What is dumpster diving

Searching trash for valuable or sensitive information

60
New cards

What is shoulder surfing

Stealing information by watching someone directly

61
New cards

What is eavesdropping

Listening to or recording conversations, transmissions, or keystrokes

62
New cards

What is the dark web

A part of the Internet accessible only through special software and protocols such as Tor

63
New cards

What is the deep web

Internet content not indexed by search engines, often behind logins or paywalls

64
New cards

What is encryption

Scrambling data using a code so only authorised parties can read it

65
New cards

What is a key in encryption

The code used to unlock encrypted data

66
New cards

What is a brute-force attack

Trying all possible password combinations to break into an account

67
New cards

What is public key encryption

A two-key system used to secure electronic transmissions

68
New cards

What is a certificate authority

A trusted third party that authenticates public key encryption

69
New cards

What is ISO 27000

A family of standards for establishing and improving an information security management system

70
New cards

What is SIEM

Security Information and Event Management that collects and analyses security data across an organisation

71
New cards

What is a firewall

A tool that controls network traffic and blocks unauthorised access

72
New cards

What is an IDS

Intrusion Detection System that monitors for hacking attempts

73
New cards

What is a honeypot

A fake target designed to lure attackers

74
New cards

What is a patch

A software update that fixes known security holes

75
New cards

What is a whitelist

A security approach that allows only approved entities or actions

76
New cards

What is a blacklist

A security approach that blocks specified entities or actions