Download as pdf or txt
Download as pdf or txt
You are on page 1of 3

1. What do you mean by Cookies?

Describe briefly how a server keeps


cookies.

Cookies (often known as internet cookies) are text files with small pieces of data — like a
username and password — that are used to identify your computer as you use a network.
Specific cookies are used to identify specific users and improve their web browsing experience.
Data stored in a cookie is created by the server upon your connection. This data is labeled with
an ID unique to you and your computer. When the cookie is exchanged between your computer
and the network server, the server reads the ID and knows what information to specifically serve
you.

Tracking cookies are used to track users' web browsing habits. This can also be done to some
extent by using the IP address of the computer requesting the page or the referer field of the
HTTP request header, but cookies allow for greater precision. This can be demonstrated as
follows:
● If the user requests a page of the site, but the request contains no cookie, the server
presumes that this is the first page visited by the user. So the server creates a unique
identifier (typically a string of random letters and numbers) and sends it as a cookie
back to the browser together with the requested page.
● From this point on, the cookie will automatically be sent by the browser to the server
every time a new page from the site is requested. The server not only sends the page as
usual but also stores the URL of the requested page, the date/time of the request, and the
cookie in a log file.
2. OSI Reference Model

3. TCP/IP protocol suite

4. DoS Attack

A denial-of-service (DoS) attack is a cyberattack on devices, information systems, or other


network resources that prevents legitimate users from accessing expected services and resources.
This is usually accomplished by flooding the targeted host or network with traffic until the target
can't respond or crashes. DoS attacks can last from a few hours to many months, costing
companies and consumers time and money while their resources and services are unavailable.

You might also like