EA Flashcards: Networking and Data Management Concepts

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/29

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

30 Terms

1
New cards

IPv6

IPv4 address exhaustion; IPv6 offers vastly more addresses (128-bit).

2
New cards

Application protocols above TCP

HTTP, HTTPS, FTP, SMTP.

3
New cards

'Best effort delivery' in IP

No guarantee of delivery, order, or duplication protection.

4
New cards

Subnet masks usage by routers

To determine which part of an IP address is the network vs. host.

5
New cards

Example of phishing

A fake email from a 'bank' asking you to verify account info.

6
New cards

Example of stream processing in industry

Real-time fraud detection in banking.

7
New cards

Data lake vs. data warehouse

Lakes store raw, broad data; warehouses provide cleaned, queryable data.

8
New cards

Fact table in a data warehouse

Contains measurable, quantitative data (e.g., sales numbers).

9
New cards

Dimension table

Provides context to facts (e.g., time, location, product).

10
New cards

ETL

Extract, Transform, Load - for preparing and moving data into a warehouse.

11
New cards

AWS shared responsibility model

AWS secures the cloud infrastructure; customers secure what they build.

12
New cards

NAT Gateway in AWS

Allows instances in private subnets to access the internet.

13
New cards

Scaling up vs. scaling out

Up = adding power to one machine; Out = adding more machines.

14
New cards

Microservices

Small, independent services that work together to form an application.

15
New cards

DevSecOps

Integrating security early and throughout the DevOps lifecycle.

16
New cards

Evaluating Wi-Fi support in devices

Ensure it supports the latest 802.11 standards compatible with your router for optimal speed and reliability.

17
New cards

Signal jitter

Variation in packet arrival times; it can disrupt real-time services like VoIP.

18
New cards

Encryption protecting web traffic

It encodes data so that only intended recipients can read it, protecting confidentiality.

19
New cards

Risk of third-party cookies

They enable tracking of users across multiple unrelated sites.

20
New cards

Digital certificate in HTTPS

It verifies the identity of the server, enabling encrypted communication.

21
New cards

Public key in asymmetric encryption

It encrypts messages that only the private key can decrypt.

22
New cards

Stream processing vs. batch processing

Monitoring live financial transactions for fraud.

23
New cards

MapReduce and fault tolerance

Tasks are rerun on different nodes if a failure occurs.

24
New cards

Data lakes vs. data warehouses structure

Lakes store raw, unstructured data; warehouses store cleaned, structured data.

25
New cards

OLAP system usage

Performing complex queries and analysis across large volumes of historical data.

26
New cards

Security groups vs. NACLs in AWS

Security groups act at the instance level, NACLs at the subnet level.

27
New cards

IAM's role in AWS

To define who can access what in the AWS environment.

28
New cards

EC2 Autoscaling

It adds or removes instances based on current demand.

29
New cards

Serverless architecture for startups

It scales automatically and reduces operational overhead.

30
New cards

CIDR's advantage over traditional IP classes

It allows flexible and efficient allocation of IP address blocks.