• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/23

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

23 Cards in this Set

  • Front
  • Back

Application Server

Sever that is dedicated to running specific applications for individual clients

Router

Device that forwards packets between networks

Proxy Server

An intermediary for requests from clients seeking resources from other servers

Firewall

Provides first line of defense on a network

Back-up

Making copies of data in the event of original data is lost

Reapeater

Electronic device that recieves a signal, cleans it of unnecessary noise, regenerates it and retransmits it at a higher lvl

LAN

Local Area Network

WAN

Wide area network

MAN

Metropolitan Area

GAN

Global Area Network

OSI Model

7 Application Layer


6 Presentation Layer


5 Session Layer


4 Transport Layer


3 Network Layer


2 Data Link Layer


1Physical Layer

NIPRNET

Non-Classified Internet Protocol Router Network

SIPRNET

Secret Internet Protocol Router Network

DISN

Defense Information System Network

Virus

Malicious code written with an intention to damage the users computer

Worm

Self-replicating malware, is able to replicate without any user intervention and doesnt need to attach itself to an existing program

Trojan

malware that appears to perfomr a desirable function for the user but instead facilitates unauthorized access of the users computer system

Backdoor

a program or a set of related programs that a hacker installs on a target system to allow access to the system at a later time

Phishing

Fraudulent process of attempting to acquire sensitive information by masquerading as a trustworthy entity in an electronic communication

Brute Force Attack

Strategy used to break the encryption of data, by traversing the search space of possible keys until the correct key is found

Social Engineering

Act of manipulating people into performing actions or divulging confidentioal information

PKI

Public Key Infrastructure

DNS

Domain Name System



Translates Alphabetic domain names into IP's