1/29
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
IPv6
IPv4 address exhaustion; IPv6 offers vastly more addresses (128-bit).
Application protocols above TCP
HTTP, HTTPS, FTP, SMTP.
'Best effort delivery' in IP
No guarantee of delivery, order, or duplication protection.
Subnet masks usage by routers
To determine which part of an IP address is the network vs. host.
Example of phishing
A fake email from a 'bank' asking you to verify account info.
Example of stream processing in industry
Real-time fraud detection in banking.
Data lake vs. data warehouse
Lakes store raw, broad data; warehouses provide cleaned, queryable data.
Fact table in a data warehouse
Contains measurable, quantitative data (e.g., sales numbers).
Dimension table
Provides context to facts (e.g., time, location, product).
ETL
Extract, Transform, Load - for preparing and moving data into a warehouse.
AWS shared responsibility model
AWS secures the cloud infrastructure; customers secure what they build.
NAT Gateway in AWS
Allows instances in private subnets to access the internet.
Scaling up vs. scaling out
Up = adding power to one machine; Out = adding more machines.
Microservices
Small, independent services that work together to form an application.
DevSecOps
Integrating security early and throughout the DevOps lifecycle.
Evaluating Wi-Fi support in devices
Ensure it supports the latest 802.11 standards compatible with your router for optimal speed and reliability.
Signal jitter
Variation in packet arrival times; it can disrupt real-time services like VoIP.
Encryption protecting web traffic
It encodes data so that only intended recipients can read it, protecting confidentiality.
Risk of third-party cookies
They enable tracking of users across multiple unrelated sites.
Digital certificate in HTTPS
It verifies the identity of the server, enabling encrypted communication.
Public key in asymmetric encryption
It encrypts messages that only the private key can decrypt.
Stream processing vs. batch processing
Monitoring live financial transactions for fraud.
MapReduce and fault tolerance
Tasks are rerun on different nodes if a failure occurs.
Data lakes vs. data warehouses structure
Lakes store raw, unstructured data; warehouses store cleaned, structured data.
OLAP system usage
Performing complex queries and analysis across large volumes of historical data.
Security groups vs. NACLs in AWS
Security groups act at the instance level, NACLs at the subnet level.
IAM's role in AWS
To define who can access what in the AWS environment.
EC2 Autoscaling
It adds or removes instances based on current demand.
Serverless architecture for startups
It scales automatically and reduces operational overhead.
CIDR's advantage over traditional IP classes
It allows flexible and efficient allocation of IP address blocks.