• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/45

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

45 Cards in this Set

  • Front
  • Back

Define Host

Full Access, Provides services to clients

Define Client

Requests services from Host

Define Hub

Connects LAN segments



packet arrives at one port and is copied to other ports

Define Switch

filters/forwards packets between LAN segments



smarter than a hub

Define Router

Forwards packets between Networks

What is WAP

Wireless application protocol

What is a Proxy Server

Between applicaition and real server



improves performance/filters requests

What is the purpose of a firewall

Prevent unauthorized user access



can be hardware or software

What is VPN concentrator

built for creating remote access

What are the 3 layers of Routing

Access- user workgroup access to resources



Distribution- routing, filtering, WAN access



Core- transports large amts of traffic quickly

Define BUS topology

All devices connect to a central cable

Define Star topology

All devices connect to central hub

Define Ring topology

All devices connected to eachother



- expensiv, difficult, high bandwith

Define Mesh topology

Redundant interconnections

define MAN

Metropolitan Area Network



Town/City

Define GAN

Global Area Network



unlimitted geographically

What is the OSI model

Open System Interconnection Model

List all parts of the OSI model (PDNTSPA

Physical


Data Link


Network


Transport


Session


Presentation


Application

What is the TCP/IP Model

Four layer reference model


(corresponds to one or more layers of OSI model)

What are the 4 layers of the TCP/IP Model

Applicaition


Transport


Internet


Network

What is the difference between IPv4 and IPv6

IPv4 is most widely used 32 bit format



IPv6 is 128 bits not 32, supports more addresses

Define NIPRnet

Non-Secure Internet Protocol Router Network



- evolved from MILnet, which evolved form ARPAnet in the 1980s

Define SIPRnet

Secure Internet Protocol Router Network



- Secure up to SECRET/NOFORN

Define JWICS

Joint Worldwide Intelligence Communications System



- upto TS/SCI

What is DoDN

Global Informatin Grid (GIG)



- golbally interconnnected, includes all owned/leased comms and computing systems

What is DISN

Centrally managed and configured, provides long haul information transfer for all DoD

What is ONE-NET

Network for OCONUS Navy shore commands

What is IT21

Information Technology for 21st Century



shipboard network

Define Machine Language

Lowest level programming language

Define Assembly Language

Same as Machine Language



can use names instead of numbers

Define Operating System

Performs basic tasks, controls peripheral devices

Define Applicaiton

Group of programs for end use

What is a virus

Program/code loaded onto P.C. w/o permission

Define Worm

Replicates

Define Trojan

Disguises

What is a backdoor

undocumented way of gaining acces to a program



written by programmer

define phishing

fishing for information

What is network enumeration

discovery of hosts/devices on network

Define Buffer Overflow

When a program/process tries to store more data than a buffer is intended to handle

Define SQL injection

attack on database driven website

What is a Dictionary Attack

attempts to breach password based security systems

What is Privelage Escalation

attack on a program, granting elevated access

What is a Brute Force Attack

trial/error to decode encrypted data, exhaustive effort

What is PKI

Public Key Infrastructure



1 pair of keys: 1 public 1 private



obtained through trusted authority

What is DNS

Domain Name Service



associates domain names to IP addresses