• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/54

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

54 Cards in this Set

  • Front
  • Back
What is a host/client?
Client/Host architecture allows for multiple clients to connect and share resources on host servers
What is an application server?
A server that is designed for or dedicated to running specific applications for individual clients in order to keep resources available for other tasks
What is a hub?
Central connection point for network connections that contains multiple ports. (When a packet arrives in one port, it is copied to all ports for transmission)
What is a switch?
Central connection point for network connections that contains multiple ports. (When a packet arrives at one port, it is forwarded to its specific destination)
What is a router?
A networking device that forwards packets between networks by determining the best path to its destination.
What is WAP?

Wireless Application Protocol


-Is an open international standard for application-layer network communications in a wireless-communication environment

What is a proxy server?



A server that acts as an intermediary for requests from clients seeking resources from other servers

What is a firewall?

Provides the first line of defense for the network

What is a VPN Concentrator?
Device that provides cost savings through flexible, reliable, and high-performance connectivity via remote-access solutions over public or non-secure physical lines
What is a backup?
Making copies of data so that the original can be restored in case of data loss.
What is a repeater?
An electronic device that receives a signal, cleans it of unnecessary noise, regenerates it, and retransmits it at a higher power level.
Define an Access Router
This includes Small Office/Home Office (SOHO) models. They are located at customer sites that do not need hierarchical routing of their own
Define a Distribution Router
They aggregate traffic from multiple access routers to collect the data streams from multiple sites to a major enterprise location.
Define a Core Router
They may provide a "collapsed backbone" interconnecting the distribution tier routers from multiple buildings of a campus or large enterprise. They tend to be optimized for high bandwidth
What is topology?
The physical arrangement of a LANs components.
What is a bus topology?
Uses a common backbone (cable) to connect all devices
What is a star topology?
Features a central connection point (hub, switch, router, etc) that all devices connect to
What is a ring topology?
Every device has exactly 2 neighbors for communicating purposes. All messages travel through a ring in the same direction. A failure in any cable or device breaks the loop and can take down the entire network
What is mesh topology?
A network where all the nodes are connected to each other
What is a LAN?

Local Area Network


- A privately-owned network within a single building or campus of up to a few kilometers

What is a WAN?

Wide Area Network


-Publicly owned group of networks over a large geographical area, often a country or a continent

What is a MAN?

Metropolitan Area Network


-Slightly larger than a LAN, expanding its coverage to a group of buildings or a city and may be publicly or privately owned.

What is a GAN?

Global Area Network


-Network used for supporting mobile communications across an arbitrary number of wireless LANs, satellite coverage areas, etc

What are the layers of the OSI model?

7. Application


6. Presentation


5. Session


4. Transport


3. Network


2. Data-Link


1. Physical

What are the layers of the TCP/IP model?

Application


Transport


Internet


Network Access



What is IPv4?
Utilizes 32 bits that can be used for its address. Allows for a maximum of 4.3 billion unique addresses. IPv4 addresses mostly expressed in dot-decimal notation, for example: 192.168.15.85
What is IPv6?
Utilizes 128 bits. These are arranged in 8 groups of 4 hexadecimal numbers, where each field is separated by a colon.
What is NIPRNET?

Non-classified Internet Protocol Router Network


-Used to exchange sensitive but unclassified information and providing users internet access

What is SIPRNET?

Secret Internet Protocol Router Network


-Used to transmit classified information via the TCP/IP protocol suite in a secure environment

What is JWICS?

Joint Worldwide Intelligence Communications Systems


-A system used to transmit classified information by packet switching over TCP/IP in a secure environment

What is DoDN GIG?

Department of Defense Network Global Information Grid


-A globally interconnected set of information capabilities for collecting, processing, storing, and managing information on demand to warfighters, policy makers, and support personnel

What is DISN?

Defense Information System Network


-The DoDs worldwide enterprise level telecommunications infrastructure providing end to end information transfer in support of military operations



What is NMCI?

Navy/Marine Corps Intranet


-NMCI is a partnership between the Navy and industry whereby industry provides IT services purchased by individual Navy commands

What is ONENET?
A navy wide initiative to install a common and secure IT infrastructure to OCONUS navy locations
What is Machine Language?
The "natural language" of a particular computer, defined by the computers hardware design. Generally consists of strings of numbers (1s and 0s) that instruct computers to perform their most elementary operations at one time
What is Assembly Language?
Uses English-like abbreviations to represent elementary operations
What is High Level Language?



These include C, C++, and Java

What is an Operating System?
A software that controls a computer. It manages hardware, runs applications, provides interface for users, and stores, retrieves, and manipulates files
What is an Application?
Computer software's designed to help the user to perform singular or multiple related specific tasks
What is a virus?
Malicious code written with an intention to damage the user's computer. They attach to other files or boot sectors and need the movement of a file to infect other computers
What is a Worm?
Worms are self-replicating malware. Uses a computer network to send copies of itself to other nodes without user intervention. It does not need to attach itself to an existing program.
What is a Trojan?
Is a malware that appears to perform a desirable function for the user prior to run or install but instead facilitates unauthorized access of the user's computer system. It looks legitimate!
What is a backdoor?
A program or a set of related programs a hacker installs on a target system to allow access to the system at a later time
What is phishing?
Process of attempting to acquire sensitive information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication
What is Network Enumeration?
A computing activity in which user names, info on groups, shares, and services of networked computers are retrieved
What is Buffer Overflow?
A situation where a program writes data beyond the buffer space allocated in memory

What is SQL Injection?
The purpose is to convince the application running to run SQL code that was not intended
What is Dictionary attack?
A technique for defeating a cipher or authentication mechanism by trying to determine its encryption key or passphrase by searching likely possibilities
What is Privilege Escalation?
The act of exploiting a bug or design flaw in a software application to gain access to resources which normally would have been protected from an application or user
What is Brute Force Attack?
A strategy used to break the encryption of data. It involves traversing the search space of possible keys until the correct key is found
What is Social Engineering?
The act of manipulating people into performing actions or divulging information rather than breaking in or using technical cracking techniques.
What is PKI?

Public Key Infrastructure


-A set of hardware, software, people, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates

What is DNS?

Domain Name System


-The name resolution system that translates alphabetic domain names into numeric IP addresses

What is IT21?
It is an independently administered but centrally governed policy mandated by the CNO that implements an IP block list and DNS black hole lists as promulgated by NCDOC.