Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
45 Cards in this Set
- Front
- Back
Define Host |
Full Access, Provides services to clients |
|
Define Client |
Requests services from Host |
|
Define Hub |
Connects LAN segments
packet arrives at one port and is copied to other ports |
|
Define Switch |
filters/forwards packets between LAN segments
smarter than a hub |
|
Define Router |
Forwards packets between Networks |
|
What is WAP |
Wireless application protocol |
|
What is a Proxy Server |
Between applicaition and real server
improves performance/filters requests |
|
What is the purpose of a firewall |
Prevent unauthorized user access
can be hardware or software |
|
What is VPN concentrator |
built for creating remote access |
|
What are the 3 layers of Routing |
Access- user workgroup access to resources
Distribution- routing, filtering, WAN access
Core- transports large amts of traffic quickly |
|
Define BUS topology |
All devices connect to a central cable |
|
Define Star topology |
All devices connect to central hub |
|
Define Ring topology |
All devices connected to eachother
- expensiv, difficult, high bandwith |
|
Define Mesh topology |
Redundant interconnections |
|
define MAN |
Metropolitan Area Network
Town/City |
|
Define GAN |
Global Area Network
unlimitted geographically |
|
What is the OSI model |
Open System Interconnection Model |
|
List all parts of the OSI model (PDNTSPA |
Physical Data Link Network Transport Session Presentation Application |
|
What is the TCP/IP Model |
Four layer reference model (corresponds to one or more layers of OSI model) |
|
What are the 4 layers of the TCP/IP Model |
Applicaition Transport Internet Network |
|
What is the difference between IPv4 and IPv6 |
IPv4 is most widely used 32 bit format
IPv6 is 128 bits not 32, supports more addresses |
|
Define NIPRnet |
Non-Secure Internet Protocol Router Network
- evolved from MILnet, which evolved form ARPAnet in the 1980s |
|
Define SIPRnet |
Secure Internet Protocol Router Network
- Secure up to SECRET/NOFORN |
|
Define JWICS |
Joint Worldwide Intelligence Communications System
- upto TS/SCI |
|
What is DoDN |
Global Informatin Grid (GIG)
- golbally interconnnected, includes all owned/leased comms and computing systems |
|
What is DISN |
Centrally managed and configured, provides long haul information transfer for all DoD |
|
What is ONE-NET |
Network for OCONUS Navy shore commands |
|
What is IT21 |
Information Technology for 21st Century
shipboard network |
|
Define Machine Language |
Lowest level programming language |
|
Define Assembly Language |
Same as Machine Language
can use names instead of numbers |
|
Define Operating System |
Performs basic tasks, controls peripheral devices |
|
Define Applicaiton |
Group of programs for end use |
|
What is a virus |
Program/code loaded onto P.C. w/o permission |
|
Define Worm |
Replicates |
|
Define Trojan |
Disguises |
|
What is a backdoor |
undocumented way of gaining acces to a program
written by programmer |
|
define phishing |
fishing for information |
|
What is network enumeration |
discovery of hosts/devices on network |
|
Define Buffer Overflow |
When a program/process tries to store more data than a buffer is intended to handle |
|
Define SQL injection |
attack on database driven website |
|
What is a Dictionary Attack |
attempts to breach password based security systems |
|
What is Privelage Escalation |
attack on a program, granting elevated access |
|
What is a Brute Force Attack |
trial/error to decode encrypted data, exhaustive effort |
|
What is PKI |
Public Key Infrastructure
1 pair of keys: 1 public 1 private
obtained through trusted authority |
|
What is DNS |
Domain Name Service
associates domain names to IP addresses |