Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
54 Cards in this Set
- Front
- Back
What is a host/client?
|
Client/Host architecture allows for multiple clients to connect and share resources on host servers
|
|
What is an application server?
|
A server that is designed for or dedicated to running specific applications for individual clients in order to keep resources available for other tasks
|
|
What is a hub?
|
Central connection point for network connections that contains multiple ports. (When a packet arrives in one port, it is copied to all ports for transmission)
|
|
What is a switch?
|
Central connection point for network connections that contains multiple ports. (When a packet arrives at one port, it is forwarded to its specific destination)
|
|
What is a router?
|
A networking device that forwards packets between networks by determining the best path to its destination.
|
|
What is WAP?
|
Wireless Application Protocol -Is an open international standard for application-layer network communications in a wireless-communication environment |
|
What is a proxy server?
|
A server that acts as an intermediary for requests from clients seeking resources from other servers |
|
What is a firewall? |
Provides the first line of defense for the network |
|
What is a VPN Concentrator?
|
Device that provides cost savings through flexible, reliable, and high-performance connectivity via remote-access solutions over public or non-secure physical lines
|
|
What is a backup?
|
Making copies of data so that the original can be restored in case of data loss.
|
|
What is a repeater?
|
An electronic device that receives a signal, cleans it of unnecessary noise, regenerates it, and retransmits it at a higher power level.
|
|
Define an Access Router
|
This includes Small Office/Home Office (SOHO) models. They are located at customer sites that do not need hierarchical routing of their own
|
|
Define a Distribution Router
|
They aggregate traffic from multiple access routers to collect the data streams from multiple sites to a major enterprise location.
|
|
Define a Core Router
|
They may provide a "collapsed backbone" interconnecting the distribution tier routers from multiple buildings of a campus or large enterprise. They tend to be optimized for high bandwidth
|
|
What is topology?
|
The physical arrangement of a LANs components.
|
|
What is a bus topology?
|
Uses a common backbone (cable) to connect all devices
|
|
What is a star topology?
|
Features a central connection point (hub, switch, router, etc) that all devices connect to
|
|
What is a ring topology?
|
Every device has exactly 2 neighbors for communicating purposes. All messages travel through a ring in the same direction. A failure in any cable or device breaks the loop and can take down the entire network
|
|
What is mesh topology?
|
A network where all the nodes are connected to each other
|
|
What is a LAN?
|
Local Area Network - A privately-owned network within a single building or campus of up to a few kilometers |
|
What is a WAN?
|
Wide Area Network -Publicly owned group of networks over a large geographical area, often a country or a continent |
|
What is a MAN?
|
Metropolitan Area Network -Slightly larger than a LAN, expanding its coverage to a group of buildings or a city and may be publicly or privately owned. |
|
What is a GAN?
|
Global Area Network -Network used for supporting mobile communications across an arbitrary number of wireless LANs, satellite coverage areas, etc |
|
What are the layers of the OSI model?
|
7. Application 6. Presentation 5. Session 4. Transport 3. Network 2. Data-Link 1. Physical |
|
What are the layers of the TCP/IP model?
|
Application Transport Internet Network Access |
|
What is IPv4?
|
Utilizes 32 bits that can be used for its address. Allows for a maximum of 4.3 billion unique addresses. IPv4 addresses mostly expressed in dot-decimal notation, for example: 192.168.15.85
|
|
What is IPv6?
|
Utilizes 128 bits. These are arranged in 8 groups of 4 hexadecimal numbers, where each field is separated by a colon.
|
|
What is NIPRNET?
|
Non-classified Internet Protocol Router Network -Used to exchange sensitive but unclassified information and providing users internet access |
|
What is SIPRNET?
|
Secret Internet Protocol Router Network -Used to transmit classified information via the TCP/IP protocol suite in a secure environment |
|
What is JWICS?
|
Joint Worldwide Intelligence Communications Systems -A system used to transmit classified information by packet switching over TCP/IP in a secure environment |
|
What is DoDN GIG?
|
Department of Defense Network Global Information Grid -A globally interconnected set of information capabilities for collecting, processing, storing, and managing information on demand to warfighters, policy makers, and support personnel |
|
What is DISN?
|
Defense Information System Network -The DoDs worldwide enterprise level telecommunications infrastructure providing end to end information transfer in support of military operations |
|
What is NMCI?
|
Navy/Marine Corps Intranet -NMCI is a partnership between the Navy and industry whereby industry provides IT services purchased by individual Navy commands |
|
What is ONENET?
|
A navy wide initiative to install a common and secure IT infrastructure to OCONUS navy locations
|
|
What is Machine Language?
|
The "natural language" of a particular computer, defined by the computers hardware design. Generally consists of strings of numbers (1s and 0s) that instruct computers to perform their most elementary operations at one time
|
|
What is Assembly Language?
|
Uses English-like abbreviations to represent elementary operations
|
|
What is High Level Language?
|
These include C, C++, and Java |
|
What is an Operating System?
|
A software that controls a computer. It manages hardware, runs applications, provides interface for users, and stores, retrieves, and manipulates files
|
|
What is an Application?
|
Computer software's designed to help the user to perform singular or multiple related specific tasks
|
|
What is a virus?
|
Malicious code written with an intention to damage the user's computer. They attach to other files or boot sectors and need the movement of a file to infect other computers
|
|
What is a Worm?
|
Worms are self-replicating malware. Uses a computer network to send copies of itself to other nodes without user intervention. It does not need to attach itself to an existing program.
|
|
What is a Trojan?
|
Is a malware that appears to perform a desirable function for the user prior to run or install but instead facilitates unauthorized access of the user's computer system. It looks legitimate!
|
|
What is a backdoor?
|
A program or a set of related programs a hacker installs on a target system to allow access to the system at a later time
|
|
What is phishing?
|
Process of attempting to acquire sensitive information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication
|
|
What is Network Enumeration?
|
A computing activity in which user names, info on groups, shares, and services of networked computers are retrieved
|
|
What is Buffer Overflow?
|
A situation where a program writes data beyond the buffer space allocated in memory
|
|
What is SQL Injection?
|
The purpose is to convince the application running to run SQL code that was not intended
|
|
What is Dictionary attack?
|
A technique for defeating a cipher or authentication mechanism by trying to determine its encryption key or passphrase by searching likely possibilities
|
|
What is Privilege Escalation?
|
The act of exploiting a bug or design flaw in a software application to gain access to resources which normally would have been protected from an application or user
|
|
What is Brute Force Attack?
|
A strategy used to break the encryption of data. It involves traversing the search space of possible keys until the correct key is found
|
|
What is Social Engineering?
|
The act of manipulating people into performing actions or divulging information rather than breaking in or using technical cracking techniques.
|
|
What is PKI?
|
Public Key Infrastructure -A set of hardware, software, people, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates |
|
What is DNS?
|
Domain Name System -The name resolution system that translates alphabetic domain names into numeric IP addresses |
|
What is IT21?
|
It is an independently administered but centrally governed policy mandated by the CNO that implements an IP block list and DNS black hole lists as promulgated by NCDOC.
|