• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/112

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

112 Cards in this Set

  • Front
  • Back
Host/Client
Host is the main computer connected to other computers (clients) to which it provides data or computing services via a network
Application Server
A specialized server in a client server network that has the sole responsibility of running specific applications within that network i.e. a Netscape or Oracle application server
Hub
A common connection point for devices in a network. Usually used to connect segments of a LAN
Switch
Same as a HUB only smarter. It will only forward the packet to the intended recipient port
Router
A physical device that joins multiple wired or wireless networks together. For example your home network uses a router to connect the home LAN to the WAN of the internet.
WAP – Wireless access protocol
An open international standard for application-layer network communications in a wireless communication environment. Most common use involves accessing the mobile web from a mobile phone or PDA.
Proxy server
An internet server that controls client access to the internet. It can stop employees from accessing undesirable websites and it can hide the internal network’s identity so monitoring is difficult for external users.
Firewall
A device configured to permit or deny computer applications upon a set of rules or other criteria. Used to block unauthorized access while permitting authorized communications.
VPN Concentrator – Virtual Private Network
A network created within the internet only accessible to permitted users
Back-up
The process of backing up refers to making copies of data so that these additional copies may be used to restore the original after a data loss event.
Repeater
Regenerate incoming electrical, wireless or optical signals. With physical media like Ethernet or Wi-Fi, data transmissions can only span a limited distance before the quality of the signal degrades. Repeaters attempt to preserve signal integrity and extend the distance over which data can safely travel
Access Layer of Routing
Small Office Home Office (SOHO) routers. are located at customer sites such as branch offices that do not need hierarchical routing of their own. Typically, they are optimized for low cost.
Distribution Layer of Routing
aggregate traffic from multiple access routers to a major enterprise location often are responsible for enforcing quality of service across a WAN, so they may have considerable memory, multiple WAN interfaces, and substantial processing intelligence
Core Layer of Routing
provide a "collapsed backbone" interconnecting the distribution tier routers from multiple buildings of a campus, or large enterprise locations. They tend to be optimized for high bandwidth
Bus
Network architecture in which a set of clients are connected via a shared communications line, called a bus
Star
All devices are connected to a central hub
Ring
Network topology in which each node connects to exactly two other nodes, forming a ring
Mesh
The topology of a network whose components are all connected directly to every other component
LAN or Local Area Network
A computer network covering a small physical area, like a home, office, or small group of
buildings.
WAN or Wide Area Network
A computer network that covers a broad area (i.e., any network whose communications links cross metropolitan, regional, or national boundaries
MAN or Metropolitan Area Network
A large computer network that usually spans a city or a large campus
GAN or Global Area Network
A network that is composed of different interconnected computer networks and covers an unlimited geographical area
NIPRNET
Non-classified Internet Protocol Router Network, unclassified to sensitive information on an internal basis also provides internet access, DOD owned
SIPRNET
Secret Internet Protocol Router Network, deployed to Embassies and Military Commands
JWICS
Joint Worldwide Intelligence Communications System, network to connect all DOD Intelligence Information Systems together
DoDN (GIG) – DOD Network the Global Information Grid
A Globally interconnected end-to-end set of information capabilities for collecting processing, storing, disseminating, and managing info on demand to the war fighter, policy makers, and support personnel.
DISN – Defense Information Systems Network
The DOD enterprise network for providing data, video, and voice services
NMCI – Navy/Marine Corps Intranet
A DON program where information Technology services have been outsourced to an outside contractor. Deployed throughout the Navy and Marine Corps
ONE-NET – OCONUS Navy Network
A Navy-wide initiative to install a common and secure IT infrastructure to OCONUS Navy locations. It is based on the Navy-Marine Corps Intranet (NMCI) architecture and is designed to be interoperable with IT-21, NMCI, and the Global Information Grid
IT21
Information technology for the 21st century
Machine Language
Also called machine code, this is the low-level binary code executed by the processor
Assembly Language
Is a low level programming language using the human readable instructions of the CPU. One level removed from machine language
High Level Language
That enables a programmer to write programs that are more or less independent of a particular type of computer. Such languages are considered high-level because they are closer to human languages and further from machine languages i.e. C, Python, C++
Operating System
Is an interface between hardware and user, which is responsible for the management and coordination of activities and the sharing of the resources of a computer, that acts as a host for computing applications run on the machine
Application
Any program designed to perform a specific function directly for the user or, in some cases, for another application program
Virus
Software program, script, or macro designed to infect, destroy, modify, or cause other problems with your computer or software programs. Some only cause a minor modification i.e. Happy Birthday others however are very harmful i.e. cause hard drives to be erased
Worm
A self-replicating virus that does not alter files but resides in active memory and duplicates itself this causes the system to slow or halt completely
Trojan
A program that appears legitimate, but performs some illicit activity when it is run. It may be used to locate password information or make the system more vulnerable to future entry or simply destroy data or programs on the hard drive.
Backdoor
A remote administration utility that, once installed on a computer, allows a user access and control it over a network or the Internet. A backdoor is usually able to gain control of a system because it exploits undocumented processes in the system's code.
Phishing
A criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication. Usually associated with ID theft or bank fraud
Network Enumeration
A computing activity in which user names, and info on groups, shares and services of networked computers are retrieved. This can expose vulnerabilities that lead to unauthorized access and havoc
Buffer Overflow
An anomaly where a process stores data in a buffer outside the memory the programmer set aside for it. This can cause catastrophic errors.
(SQL) Structured Query Language Injection
An attack in which malicious code is inserted into strings that are later passed to an instance of SQL Server for parsing and execution
Dictionary Attack
A method of breaking into a password-protected computer or server by systematically entering every word in a dictionary as a password
Privilege Escalation
The act of exploiting a bug or design flaw in a software application to gain access to resources which normally would have been protected from an application or user
Brute Force Attack
A technique used to break an encryption or authentication system by trying all possibilities. This usually only takes about half as many tries as there are possibilities
Social Engineering
The practice of tricking a user into giving, or giving access to, sensitive information, thereby bypassing most or all protection
Describe the functionality of PKI
A set of hardware, software, people, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates that are unique to each user
State the purpose of DNS
Domain Name System – Translates domain names meaningful to humans into the numerical identifiers associated with networking equipment. Example: It translates www.example.com into 192.0.32.10
Red Cross Message
Red Cross messages are delivered 24x7x365 to military personnel at any duty station
ADNS – (Automated Digital Networking System)
The primary function of the ADNS is to connect Navy shipboard networks to other ship and shore networks for transferring Internet Protocol (IP) data of various classification levels
CUDIXS – (Common User Digital Information Exchange System)
Provides a 2400 baud full duplex interface, over a satellite link with mobile platforms, for the receipt and transmission of GENSER (GENeral SERvice) message traffic between FMX (Fleet Message Exchange System) and mobile platforms equipped with afloat automated systems
VERDIN – (VLF Digital Information Network)
Is a broadcast system that provides a highly reliable and secure system for worldwide delivery of operational, tactical, and administrative messages from the Fleet Submarine Broadcast System (FSBS) and Minimum Essential Emergency Communications Network (MEECN / a network of systems providing uninterrupted communications throughout a nuclear warfare environment.
NOVA
Is an Automated Message Store and Forward system. NOVA is a UNIX based. Defense Message System Transitional Hub)
IBS – (Integrated Broadcast System)
Has integrated several existing intelligence and information dissemination systems into a single system of broadcasts that will allow for the receipt of data via a single receiver (the joint tactical terminal).
INMARSAT – (International Maritime Satellite)
Non-profit organization that connects satellites for maritime communication.
Defense Message System
A profiling system that forewords messages based on criteria to parties that are required to take action on a message.
NREMS – Navy Regional Enterprise Message System
Provides web-based messaging capability that allows users (with accounts) to send and receive DMS messages using a web browser or via email
AMHS – Automatic Message Handling System
Provides simplified message drafting, coordination, and release of outgoing messages and a message internal distribution and delivery function for incoming messages
VTC – (Video Teleconferencing)
An extension of traditional telephony technologies with the added feature of being able to see the person or persons with whom one is talking
DCO – (Defense Connect Online)
A Web-based virtual meeting room
GINGERBREAD
Warns that “voice imitative deception is suspected on the network"
BEADWINDOW
A real-time procedure which brings to the immediate attention of circuit operators the fact that an EEFI (Essential Elements of Friendly Information) disclosure has (or may have) occurred
RIVERCITY
Communications is cut, severing the ship, command, or tactical squad from the outside world
Meaconing
The intentional transmission of signals designed to deceive users of navigational aids (tactical air navigation, GPS, nondirectional beacon, instrument landing system, etc.).
Intrusion
The intentional insertion of EM (electromagnetic) energy into transmission paths in any manner, with the objective of deceiving operators or causing confusion
Jamming
The deliberate radiation, re-radiation, or reflection of EM energy for the purpose of preventing or reducing an enemy’s effective use of the EM spectrum and with the intent of degrading or neutralizing the enemy’s combat capability
Spectrum Management
Used to ensure that various combatant units and AORs practice good RF hygiene. Each DoD Branch has it's own spectrum management guidance, with the ones for the Army (FM 24-2) and USMC (MCO 2400.2) being available for study
PLA – (Plain Language Address)
Is the component used to denote the command short title and sometimes geographic location used in message addressing
DTG – (Date Time Group)
An indicator is assigned to uniquely describe a message for identification and file purposes only. A DTG has two parts
UTC – (ZULU)
Coordinated Universal Time (more commonly known as Greenwich Mean Time / GMT).
R – Routine
For messages of all types that justify transmission by rapid means unless they are of sufficient urgency to require higher precedence. Speed of service - 6 hours
P – Priority for messages
Reserved for messages containing essential information for the conduct of operations in progress. This is normally the highest precedence for administrative messages. Speed of service - 3 hours
O – Immediate
Reserved for messages relating to situations that gravely affect the national forces or populace, and require immediate delivery to the addressees. Speed of service - 30 minutes
Z – Flash
This precedence is reserved for initial enemy contact messages or operational combat messages of extreme urgency. Brevity is mandatory. Speed of service - As fast as possible!
W – Flash Override
Overrides all other codes, including Flash.
OPTASK COMMS
Which nets and approved frequencies are authorized for use within a given area
COMMPLAN
What communication circuits are required and indicate where/when they are needed throughout a given underway period
(TSO) Telecommunication Service Order
Authorization from DISA to start, change, or discontinue circuits or trunks.
(TSR) Telecommunication Service Request
An approved and funded telecom requirement for communication service
COMSPOT/Communications service advisory
A message of a disruption or known loss of service in communications
Electronic Key Management System (EKMS)
Administrative controls to track, issue, filing, use or order electronic key material
(OTAT/OTAR) Over The Air Transfer/Over the Air Rekey
Electronic keymat sent over the air to required units
Describe TEMPEST
The practice of preventing emissions from leaving and potentially being intercepted by using means such as shielding
Emissions Control (EMCON)
Control of all electromagnetic and acoustic radiations
Mobile Detachment
to deploy in support of a tasked requirement
Direct Support Assets
DIRSUP Assets are used for short-duration requirements which require specialists not normally included in a ship’s PCS complement
Mine Warfare UUV Platoon
Consist of Remote Environmental Monitoring Units (REMUS) conducting oceanographic
surveys designed to integrate new sensors into current programs
Naval Oceanography ASW Team (NOAT)
Provide environmental support to ASW forces worldwide at various Fleet and COCOM echelons.
Strike Group Oceanography Team (SGOT)
Provide timely, comprehensive, and tactically relevant meteorological and oceanographic (METOC) products
Mobile Environmental Teams (MET)
These teams carry with them all of the equipment needed to accomplish their forecast mission to ships at sea or shore commands forward
Fleet Survey Team (FST)
A rapid-response team capable of performing quick-turnaround hydrographic surveys anywhere in the world.
(PSYOPs)
DOD defines PSYOP as planned operations to influence their emotions, motives, objective reasoning, and ultimately the behavior of foreign governments, organizations, groups, and individuals.
(MILDEC)
Deception guides an enemy into making mistakes by presenting false information, images, or statements.
OPSEC
Defined as a process of identifying information that is critical to friendly operations and which could enable adversaries to attack operational vulnerabilities
Electronic Warfare (EW)
EW is defined by DOD as any military action involving the direction or control of electromagnetic spectrum energy to deceive or attack the enemy
Red Team
Uses publicly available data to test Information Assurance Vulnerability Alert and system configuration compliance of U.S. Navy networks and attempt to detect any vulnerabilities
Blue Team
Ensures U.S. Navy networks meet Information Assurance Vulnerability Alert and system configuration compliance; provides assistance prior to and during inspections to remedy discrepancies
Fleet Electronic Support
Installs and maintains specialized equipment for permanent and ad-hoc missions
USC Title 10
Outlines the role of armed forces in the United States Code. It provides the legal basis for the roles, missions and organization of each of the services as well as the United States Department of Defense
Subtitle A
General Military Law, including UCMJ
Subtitle B
Army
Subtitle C
Navy and Marine Corps
Subtitle D
Air Force
Subtitle E
Reserve Components
USC Title 50
Outlines the role of War and National Defense in the United States Code. (Chapter 36, Foreign Intelligence Surveillance, germane.)
Define CRITIC
A report used to notify the President and the National Security Council of critical information
CCOP – Cryptologic Carry-On Program
Provides specialized equipment for Fleet cryptologic requirements
NITES – Navy Integrated Tactical Environmental Subsystem
The Navy is currently the nation's only military service that operates a distributed model in support of tactical weather prediction
JDISS – Joint Deployable Intelligence Support System
Provides a family of hardware and software capabilities that allow connectivity and interoperability with intelligence systems supporting forces, in garrison, and deployed during peace, crisis, and war.
Maritime Domain Awareness
Defined as the effective understanding of anything associated with the maritime domain that could impact the security, safety, economy, or environment
(MOC) Maritime Operations Center
Provides critical support in the execution of the nation's Maritime Strategy, giving commanders the processes, enabled by interoperable, networked systems, to enhance maritime capabilities