• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/53

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

53 Cards in this Set

  • Front
  • Back

HOST/CLIENT

Describes the relationship between twocomputer programs in which one programs, the client, makes a service requestfrom


another program, the server, which fulfills the request.

APPLICATION SERVER
A software framework dedicated to the efficientexecution of procedures (programs, routines, scripts) for supporting theconstruction of applications.
HUB

A commonconnection point for devices in a network.


SWITCH

A smallhardware device that joins multiple computers together within one LAN.


ROUTER

Device that forwards data packets betweennetworks, creating an overlay inter network.

WIRELESS APPLICATION PROTOCOL (WAP)

Describes a protocol suite allowing tehinteroperability of WAP equipment & software with many different networktechnologies, thus allowing the building of a single platform for competingnetwork technologies such as GSM & IS-95 (also known as CDMA) networks.


PROXY SERVER


Acts as an intermediary for requests fromclients seeking


resources from other servers

FIREWALL

Device/set of devices designed to permit/denynetwork transmission based upon a set of rules & is frequently used toprotect network from unauthorized access while permitting legitimatecommunications to pass.
VIRTUAL PRIVATE NETWORK (VPN) CONCENTRATOR



Device that incorporates the most advancedencryption &


authentication techniques available; and are builtspecifically for creating a remote-access or site-to-site VPN and ideally are


deployed where the requirement is for a single device to handle a very largenumber of VPN tunnels.



BACK-UP


Refers to making copies of data so that theseadditional copies may be used to restore the original after a data loss event.

NETWORK REPEATER

Devices that regenerate incoming electrical,wireless or optical signals.


ACCESS

Access routers, including 'small office/homeoffice' (SOHO)


models, are located at customer sites such as branch officesthat do not need hierarchical routing of their own.



DISTRIBUTION

Distribution routers aggregate traffic frommultiple access


routers, either at the same site, or to collect the datastreams from multiple sites to a major enterprise location


CORE

Core router may provide a "collapsedbackbone" interconnecting the distribution tier routers from multiplebuildings of a campus, or large enterprise locations

BUS TOPOLOGY

Architecture in which a set of clients areconnected via a shared communications line, called a bus.
- simplest way to connect multiple clients, but may have problems when twoclients want to transmit at the same time on the same bus.
- systems which use bus network normally have some scheme of collisionshandling/collision avoidance form communication on the bus, quite often usingCarrier Sense Multiple Access or the presence of a bus master which controlsaccess to the shared bus resource.

STAR TOPOLOGY


One of the most common computer networktopologies


RING TOPOLOGY



Each node connects to exactly 2 othernodes, forming a single continuous pathway for signals through each node - aring. Data travels from node to node, with each node along the way handlingevery packet.
Provides only one pathway between any two nodes - ring networks may bedisrupted by the failure of a single link.




MESH TOPOLOGY

Each node in the network may act as anindependent router,


regardless of whether it is connected to another network ornot.


LOCAL AREA NETWORK

Group of computers & associated devices thatshare a common communications line or wireless link.
WIDE AREA NETWORK (WAN)

Spans a large geographic area, such as a state,province or


country.

METROPOLITAN AREA NETWORK (MAN)

Usually interconnects a number of LANsusing a high-capacity backbone technology, such as fiber-optical links &provides


up-link services to WANs & the internet.


GLOBAL AREANETWORK


Refers to any network that is composed ofdifferent


interconnected computer networks (WANs) & also covers an


unlimited geographical area.


Open Systems Interconnection (OSI)

A way of sub-dividing a communications systeminto smaller parts called layers. Similar communications functions are groupedinto logical layers.


Transmission Control Protocol and InternetProtocol (TCP/IP)

Is the most used network protocol
- just one protocol, but a set of protocols (protocol stack)
- Protocol - language used to make 2 computers to talk to each other



Internet Protocol version 4 (IPv4)


- Defined an IP address as a 32-bit number(consisting of 4 octets)
- Address consisting of 32 bits which limits the address space to 4294967296(2^32) possible unique addresses.
- Reserves some addresses for special purposes such as private networks (~18million addresses) or multicast addresses (~270 million addresses)

Internet Protocol version 6 (IPv6)

- Developed in 1995, defined an IP address as a128-bit number (consisting of 16 octets)
- Mathematically, the new address space provides the potential for a max of2^128, or about 3.403x10^38 unique addresses.

Unclassified but Sensitive Internet Protocol(IP) Router Network (NIPRNet)

A global long-haul IP based network to supportunclass IP data communications services for combat support applications to theDoD, Joint Chiefs of Staff (JS), Military Departments (MILDEPS), and CombatantCommands (COCOM)


Secret IP Router Network (SIPRNet)

DoD's largest interoperable Command and Control(C2) data


network, supporting:



Joint Worldwide Intelligence CommunicationsSystem (JWICS)

Operated by the DIA as a secure global networkdesigned to meet the requirements for TS/SCI multimedia intelligence


communications worldwide. Provides users an SCI-level


high-speed multimedianetwork using high-capacity communications to handle data, voice, imagery &graphics




Departmentof Defense Network GIG


A globally interconnected, end-to-end set ofinformation


capabilities for collecting, processing, storing, disseminating,and managing information on demand to warfighters, policy makers, & supportpersonnel.


Defense Information System Network (DISN)


The United States DoD's enterprise network forproviding data, video & voice services.

Navy/Marine Corps Intranet (NMCI)

The major US-CONUS shore based Navy networkproviding


SIPRNET & NIPRNET connectivity.


OCONUS Navy Enterprise Network (ONE-NET)

A Navy-wide initiative to install a common &secure IT


infrastructure to OCONUS Navy locations to access NIPRNET &SIPRNET.



IT-21 Network

An information transfer strategy that providesNetwork


Connectivity capable of Voice, Data & Video for afloat units. Itprovides access to NIPRNET, SIPRNET & JWICS, supports all


tactical &non-tactical mission areas. IT-21 uses Commercial Off the Shelf (COTS)Technology to keep ships updated with the most modern equipment.


Machine Language


A system of instructions & data executeddirectly by a computer's central processing unit.

Assembly Languages

A type of low-level language for programmingcomputers,


microprocessors, micro-controllers, & other integrated circuits.They implement a symbolic representation of the numeric


machine codes &other constants needed to program a particular CPU architecture.


High-level Language

A programming language with strongabstraction from the details of the computer. It may use natural languageelements, be easier to use or be more portable across platforms.


Operating System:

A set of system software programs in a computerthat regulate the ways application software programs use the computer


hardware& the ways that users control the computer.

Applications

Computer software designed to help the user toperform singular or multiple related specific tasks.

Virus

Computer program that can copy itself and infecta computer.
Spreads from one computer to another


(in some form of executable code) when itshost is taken to the targeted infected computer.

Worms

Self-replicating malware computer programs.
They use a computer network to send copies of their selves to other nodes(computers on the network) and may do so without any user intervention.
Trojans



Malware that appears to perform a desirablefunction for the user prior to run or install but instead facilitatesunauthorized


access of the user's computer system.


Backdoor

In computer systems (or cryptosystem oralgorithm) are a


method of bypassing normal authentication, securing remote


access to a computer, obtaining access to plaintext, and so on, whileattempting to remain undetected.

Phishing

The criminally fraudulent process ofattempting to acquire


sensitive information by masquerading as a trustworthyentity in an electronic communication; information such as:
- Usernames -Passwords - Andcredit card details


Network Enumeration

Computing activity in which user names, andinfo on groups, shares and services of networked computers are retrieved.


Buffer Overflow

Anomaly where a program, while writing datato a buffer,


overruns the buffer's boundary and overwrites adjacent memory.
This may result in erratic program behavior, including memory access errors,incorrect results, program termination (a crash), or a breach of systemsecurity


SQL injection

A code injection technique that exploits asecurity vulnerability occurring in the database layer of an application. Theidea is to convince the application to run SQL code that was not intended.



DictionaryAttack

Technique for defeating a cipher orauthentication mechanism by trying to determine its decryption key or passphraseby searching likely possibilities
Privilege Escalation

Act of exploiting a bug or design flaw in asoftware application to gain access to resources which normally would have been


protected from an application or user.

BruteForce Attack

Strategy used to break the encryption ofdata. It involves


traversing the search space of possible keys until thecorrect key is found (trying to "crack" a password).


SocialEngineering

Act of manipulating people into performingactions or divulging confidential information, rather than by breaking in orusing


technical cracking techniques; essentially a fancier,


more technical wayof lying.

Public KeyInfrastructure (PKI)


- Set of hardware, software, people, policies,and procedures needed to create, manage, distribute, use, store, and revoke


digital certificates.



Domain Name System (DNS)

- Translates domain names (meaningful tohumans) into the


numerical (binary) identifiers associated with networking


equipment for the purpose of locating and addressing these


devices worldwide.