• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/65

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

65 Cards in this Set

  • Front
  • Back
Define Host/Client
Host/Client (matter of perspective)
- host is the main computer connected to other computers (clients) to which it provides data or other computing services via a network.
Define Application Server
Application Server
- a specialized server in a client-server network that has the sole responsibility of running specific applications within that network, i.e. netscape or oracle application server.
Define Hub
Hub
- a common connection point for devices in a network. Usually used to connect segments of a LAN. Device that forwards data it receives on any port to every computer in the network.
Define Switch
Switch (same as Hub only smarter, may be used to connect hubs together)
- device that only forwards a packet to a client based on hardware address.
Define Router
Router
- device that joins multiple networks together breaking up broadcast domains.
Define WAP
Wireless Access Protocol
- industry specification that allows advanced messaging and information services to be delivered to wireless devices independent of which wireless technology they use.
Define Proxy Server
Proxy Server
- an internet server that controls client access to the internet. It can stop employees from accessing undesirable websites and it can hide the internal network identity so monitoring is difficult for external users.
Define Firewall
Firewall
- device configured to permit or deny computer applications upon a set of rules or other criteria.
Define VPN
Virtual Private Network
- a segregated network often used by companies or organizations to communicate confidentially over a public network.
Define VPN Concentrator
VPN Concentrator
- for creating remote access VPNs with high availability, high performance and scalability.
Define Backup
Backup
- to making copies of data to restore original after a data loss.
Define Repeater
Repeater
- regenerate incoming electrical, wireless or optical signal to preserve signal integrity and extend the distance over which data can safely travel.
Define a typical SOHO setup.
Small Office Home Office
- refers to small collection of clients and routers typically located at a customer site or branch office without complex routing.
- optimized for low cost.
Define a typical Distribution setup.
Distribution
- aggregated traffic from multiple access routers to a major enterprise location, responsible for enforcing quality of service across a WAN.
- may consist of large quantity of memory, multiple WAN interfaces, and substantial processing intelligence.
Define a typical Core setup.
Core
- provide a "collapsed backbone" interconnecting the distribution tier routers from multiple buildings of a campus, or large enterprise locations. They tend to be optimized for high bandwidth.
Define Network Topology
Network Topology
- arrangement of the various elements (links, nodes, etc.) of a computer network.
- Four major types - Bus, Star, Ring and Mesh.
Define Bus
Bus
- network with set of clients are connected via a shared communications line.
- if a terminal or client goes offline, anything behind it in the line is also offline.
Define Star
Star
- network with all clients connected to a central hub.
Define Ring
Ring
- network with each client being connected to exactly two other nodes, forming a ring.
Define Mesh
Mesh
- network where some clients are connected to two or more clients.
Define LAN
Local Area Network
- computer network covering a small physical area like a home, office, or small group of buildings.
Define WAN
Wide Area Network
- computer network covering a broad area, ie. any network whose communications links cross metropolitan, regional, or national boundaries.
Define MAN
Metropolitan Area Network
- large computer network that usually spans a city or a large campus.
Define GAN
Global Area Network
- expansive network composed of different interconnected networks covering an unlimited geographical area, ie. JWICS.
Function of OSI Model Layer 1
(remember - All People Seem To Need Data Procession - Please Do Not Throw Sausage Pizza Away)
Layer 1 - Physical Layer
- the electrical and physical specifications for devices in relation to transmission medium - physical layout of hubs, repeaters and network adapters.
Function of OSI Model Layer 2
(remember - All People Seem To Need Data Procession - Please Do Not Throw Sausage Pizza Away)
Layer 2 - Data Link Layer
- the functional and procedural means to transfer data between hardward and network entities, enabling way to detect and correct errors that may occur in the Physical layer, ie. Ethernet.
Function of OSI Model Layer 3
(remember - All People Seem To Need Data Procession - Please Do Not Throw Sausage Pizza Away)
Layer 3 - Network Layer
- the functional and procedural means of transferring variable length data sequences from a source to a destination, ie. Router.
Function of OSI Model Layer 4
(remember - All People Seem To Need Data Procession - Please Do Not Throw Sausage Pizza Away)
Layer 4 - Transport Layer
- provides transparent transfer of data between end users, providing connection-oriented data stream support, reliability, flow control, and multiplexing.
- uses TCP and UDP Protocols.
Function of OSI Model Layer 5
(remember - All People Seem To Need Data Procession - Please Do Not Throw Sausage Pizza Away)
Layer 5 - Session Layer
- establishes, manages and terminates the connections between the local and remote clients and applications.
Function of OSI Model Layer 6
(remember - All People Seem To Need Data Procession - Please Do Not Throw Sausage Pizza Away)
Layer 6 - Presentation Layer
- data translator for the network, syntax.
Function of OSI Model Layer 7
(remember - All People Seem To Need Data Procession - Please Do Not Throw Sausage Pizza Away)
Layer 7 - Application Layer
- interface responsible for displaying received information to the user. ie. HTTP, FTP, SMTP
Function of TCP/IP Model Layer 1
Layer 1 - Network Interface Layer (Link Layer)
- physical and logical network component used to interconnect hosts or nodes in the network.
Function of TCP/IP Model Layer 2
Layer 2 - Internet Layer
- group of internetworking methods, protocols, and specifications in the Internet protocol suite that are used to transport datagrams (packets) from the originating host across network boundaries.
Function of TCP/IP Model Layer 3
Layer 3 - Transport Layer
- provides host-to-host communication reliability, flow control, and multiplexing services for applications.
- End to end message transmission or connecting applications at the transport layer can be categorized as either connection-oriented TCP, or connectionless UDP.
Function of TCP/IP Model Layer 4
Layer 4 - Application Layer
- specifies the shared protocols and interface methods used by hosts in a network. ie. FTP and SMTP.
Assumes most functions of the session and presentation layers of the OSI model.
Differences with IPv4 and IPv6.
IPv4
- uses 32 bit decimal notation addressing (four byte segments, 192.1.56.10), which limits the address space to 2^32 possible unique addresses.
IPv6
- uses 128 bit hexidecimal notation addressing (eight groups of four hexadecimal digits, 2001:0db8:0000:0042:0000:8a2e:0370:7334), which can support up to 2^128 unique addresses to fulfill future expansion and security needs.
Define NIPRNET
Nonsecure Internet Protocol Router Network NIPRNet
- used to exchange sensitive but unclassified information between 'internal' users as well as providing users access to the Internet, is DoD owned and created by DISA.
Define SIPRNET
Secret Internet Protocol Router Network SIPRNet
- system of interconnected computer networks used by the US DoD and the US Department of State to transmit classified information (up to and including information classified SECRET) via the TCP/IP protocol suite in a completely secure environment.
Define JWICS
Joint Worldwide Intelligence Communications System JWICS
- is a system of interconnected computer networks used by the US DoD and the US Department of State to transmit classified information (up to Top Secret including SCI) by packet switching over TCP/IP in a secure environment.
Define DoDN (GIG)
DoD Network Global Information Grid
- Globally interconnected end-to-end set of information capabilities for collecting processing, storing, disseminating, and managing info on demand to the warfighter, policy makers, and support personnel.
Define DISN
Defense Information Systems Network DISN
- the DoD enterprise network for providing data, video, and voice services.
Define NMCI
Navy and Marine Corps Intranet NMCI
- DoN program where information technology services have been outsourced to an outside contractor, deployed throughout the Navy and Marine Corps.
Define ONE-NET
OCONUS Navy Enterprise-Network ONE-NET
- Navy-wide initiative to install a common and secure IT infrastructure to OCONUS Navy locations based on the Navy-Marine Corps Intranet (NMCI) architecture and is designed to be interoperable with IT-21, NMCI, and the Global Information Grid.
Define IT21
Information Technology for the 21st Century IT21
- a Navy Intranet to enable network-centric warfare and warfare support through improved bandwidth, interoperability, and security, plus computing services to support user needs.
Define Machine Language
Machine Language
- machine code - system of instructions and data executed directly by a CPU, a primitive programming language, bits.
Define Assembly Language
Assembly Language
- low level programming language using human readable instructions of the CPU, uses letters instead of numbers.
Define High-Level Language
High-Level Language
- programming language, high-level language, closer to human language. ie. C, Python or C++.
Define Operating System
Operating System
- interface between hardware and user responsible for the management and coordination of activities and the sharing of computer resources.
- acts as host for computing applications run on the machine. ie. Windows 7, MAC OS 10.
Define Application
Application
- program designed to perform a specific function for the user or another application. ie. word processor, database programs, web browsers, development tools, drawing, paint, and image editing programs, as well as communication programs.
Define Virus
Virus
- malicious program, script, or macro designed to infect, destroy, modify computer or software program.
Define Worm
Worm
- self-replicating malicious virus that does not alter files but resides in active memory and duplicates itself - Does Not Require user intervention.
Define Trojan
Trojan
- malicious program that appears legitimate but performs some illicit activity - such as destroy data, locate password information or make the system more vulnerable to future entry.
Define Backdoor
Backdoor
- a remote administration utility that allows a user access and control of asset over a network.
Define Phishing
Phishing
- criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication.
Define Network Enumeration
Network Enumeration
- computing activity in which a user collects names and info on groups, network shares and services of networked computers to produce a logical connection between remote assets - typically to expose vulnerabilities that lead to unauthorized access and control over assets.
Define Buffer Overflow
Buffer Overflow
- process anomaly where data is stored in a buffer outside the memory programmed resulting in erratic program behavior to include memory access errors, incorrect results, program termination, or a breach of system security.
Define SQL Injection
SQL Injection
- an attack where malicious code is inserted into strings that are later passed to a SQL Server for parsing and execution.
Define Dictionary Attack
Dictionary Attack
- method of breaking into a password-protected computer or server by systematically entering every word in a dictionary as a password.
Define Privilege Escalation
Privilege Escalation
- act of exploiting a bug or design flaw in software to gain access to resources which normally are protected from an application or user.
Define Brute Force Attack
Brute Force Attack
- technique used to break an encryption or authentication system by trying all possibilities.
Define Social Engineering
Social Engineering
- practice of tricking a user into giving another user access to sensitive information to bypass most or all protection.
What is the functionality of PKI
Public Key Infrastructure
- Set of hardware, software, people, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates.
What is the purpose of DNS
Domain Name System
- translates domain names into IP addresses to locate devices worldwide.
7 Layers of OSI Model
1) Physical
2) Datalink
3) Network
4) Transport
5) Session
6) Presentation
7) Application
4 Layers of TCP/IP Model
1) Network Interface
2) Internet
3) Transport
4) Application