________ can be fitted to all equipment so that an alert will be triggered if it is removed from the premises.
New cards
2
Transmission layer
________= splitting outgoing data into packets and numbering them, a header containing a sequence number and a checksum is added to each.
New cards
3
FTP
________ (File Transfer Protocol)= rules for transferring files between computers, often used for transferring those that are too large for email attachment.
New cards
4
Internet network layer
________= stripping addresses information from incoming packet headers.
New cards
5
SMTP
________ (Simple Mail Transfer Protocol)= rules for sending emails from client to server and server to server until it reaches its destination.
New cards
6
Low latency
________- cables have layers of protective covering making them less susceptible to interference.
New cards
7
Transport layer
________= checking incoming packets and sending a resend request for any that are damaged or lost.
New cards
8
Poor security
________- anyone within range can intercept transmissions.
New cards
9
Application layer
________= providing the interfaces and protocols needed by the user.
New cards
10
circuit television
Closed- ________ (CCTV) can be used to monitor the premises.
New cards
11
Copper wire
________ is susceptible to electrical interference while fibre optic is immune.
New cards
12
IMAP
________ (Internet Message Access Protocol)= unlike POP, messages do not need downloading, they can be read and stored on the message server.
New cards
13
Permissions
________ are the levels of access to files.
New cards
14
POP
________ (Post Office Protocol)= used by a client to retrieve emails from a mail server, all emails are downloaded when there is a connection between them and are deleted from the server once done so.
New cards
15
Fibre optic
________ is more efficient however it is a lot more expensive and fragile.
New cards
16
correct order
The receiving computer reassembles the packets into the ________ using the packet headers.
New cards
17
HTTP
________ (HyperText Transfer Protocol)= rules followed by a web browser and web server when requesting and supplying information.
New cards
18
payload
The ________ contains part of the data of the file that has been split and sent.
New cards
19
box penetration
Black ________ testing= the tester is given absolutely no information about the network and must try and breach its security.
New cards
20
Radio waves
________ transmit data through air.
New cards
21
WAN
A network of networks- one connects separate LANS
New cards
22
Domain name
Human friendly IP address eg: www.google.com is a lot easier to use than a string of numbers
New cards
23
Quickest
Routers direct packets through the cheapest route to the next router, what does cheapest mean?
New cards
24
Bluetooth, Zigbee, RFID & NFC
Wi-Fi is the most well-known and the oldest but there are others that have different uses, ranges and power requirements