II- TEST BANK
true - answers (t/f) Variables update line by line.
false - answers (t/f) Typing "var" before a word only updates a variable.
the last line that is true - answers What line of an if statement will show in a console.log
area?
true - answers (t/f) A number added to a variable updates it line by line.
true - answers (t/f) The else statement at the end of an if else only executes if
everything else is false.
name, number, variable - answers Updating a variable gives the variable a new...?
how many times they are called - answers How many times do functions execute?
in a declared function - answers Where should you put lines of code that are repeated in
an on event?
false - answers (t/f) It does not matter in what order lines of code are entered.
the same name as the declared function - answers What name is used to call a
function?
equals - answers What does == mean in code?
false - answers (t/f) The most limiting statement should come last in code.
they help eliminate repeated code. - answers why create functions in code?
false - answers (t/f) && means "or"
conditionals - answers What statements are executed in sequential order based on the
value of Boolean expressions?
true - answers (t/f) A flow chart is used to trace the path of Boolean expressions.
What is a ciphertext? - answers An unrecognizable secret formatted file.
What does SSL stand for? - answers Secure Sockets Layer.
,What is a digital signature? - answers A signature that gives reason to believe that the
sender was an authorized one.
What is malicious software? - answers Another term for malware meaning harmful
software.
What does public key encryption not require? - answers A secure channel by which the
initial key exchange must occur.
Private Key Encryption - answers Another term for symmetric encryption.
What is a firewall? - answers A security system that monitors incoming/outgoing
network traffic.
What is asymmetric encryption - answers Encryption that uses a public and private key.
What is phishing? - answers An attempt to collect personal information and money by
disguising as a trustworthy source.
What is a DDOS attack? - answers A cyber attack where the perpetrator uses more
than one IP address.
What is social engineering? - answers The act of psychological manipulation of a
human.
What is ransomeware? - answers Software used to threaten a victim in order to pay.
What is hash encryption? - answers Encryption done using a hash function.
What is a digital certificate? What does it do? - answers An electronic document that
proves ownership of a public key.
What is another word for DNS spoofing? - answers DNS cache poisoning.
What is a type of encryption that uses a hash function? - answers One-way encryption.
What is pharming? - answers The act of redirecting website traffic to an alternative fake
site
What encryption type is commonly used for email? - answers Asymmetric encryption
What is PGP? - answers Pretty Good Privacy
What is net neutrality? - answers The law that asserts that all traffic on the internet is
given equal priority.
, What does each computer connected to the internet have? - answers Its own unique
address defined by the Internet Protocol.
What is the problem with IP addresses? - answers IP addresses are difficult for us to
remember.
What is a DNS, and what does it do? - answers The Domain Name Server translates
names to IP addresses.
What is a good analogy for DNS? - answers It's like an address book mapping domain
names to actual IP addresses.
What are the steps of finding a server using DNS? - answers 1. Your computer will
check its cache to see if it knows the address you are requesting.
2. The server will ask a root if it knows where the given top-level domain is (.com, .org,
etc.).
3. Once we've found our top-level domain server we will ask that server if it can find the
second-level domain server (example.com).
4. We will then find the sub-domain by asking the second-level domain server
(www.example.com)
5. The second-level domain server will then send our computer the IP address so we
can save it!
6. Finally, our PC will send a get request to the IP address.
What are the levels of domain and how are they read? - answers From highest to lowest
level: root, top-level domain, second-level domain, and subdomain
Why is DNS hierarchical? - answers Each layer is in charge of a small section of data,
its easy to manage and add data, and it's much faster leading to a scalable, fault
tolerant internet.
How fast is the DNS process? - answers Extremely fast, completing tasks in
milliseconds.
What is the internet? - answers Physically: A massive network that connects individual
networks using a series of complicated routers.
Conceptually: A philosophy of making information and knowledge open and accessible
to all.
What is a network? - answers Two or more computer systems linked together.
What do routers do? - answers Routers forward information around as requested by
constituent computers.
Who provides the routers we typically connect to? - answers The ISPs