• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/62

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

62 Cards in this Set

  • Front
  • Back

Describes the relationship between 2 computer programs in which one program, the client, makes a service request from another program, the server, which fulfills the request.

Host/Client

A software framework dedicated to the efficient execution of procedures for supporting the construction of apps.

Application Server

A common connection point for devices in a network, commonly used to connect segments of a LAN.

Hub

A small hardware device that joins multiple computers together within one LAN.

Switch

Device that forwards data packets between networks, creating an overlay internework.

Router

Standard that describes a protocol suite allowing the interoperability of WAP equipment and software with many different network technologies.

Wireless Application Protocol

Server that acts as an intermediary for request from clients seeking resources from other servers.

Proxy Server

Device or set of devices designed to permit or deny network transmission based upon a set of rules and is frequently used to protect networks from unauthorized access while permitting legitimate comms to pass.

Firewall

Device that incorporates the most advanced encryption and authentication techniques available and are built specifically for creating a remote access or site to site VPN and ideally are deployed where the requirement is for a single device to handle a very large number or VPN tunnels.

VPN Concentrator

Process of making copies of data so that these additional copies may be used to restore the original after a data loss event.

Back-Up

Devices that regenerate incoming electrical, wireless, or optical signals.

Repeater

What are the 3 layers of routing?

Access


Distribution


Core

A network architechture in which a set of clients are connected via a shared comms line.

Bus

Topology that consists of one central switch, hub, or computer, which acts as a conduit to transmit messages.

Star

Network architecture in which each node connects to exactly 2 other nodes, forming a single continuous pathway for signals through each node or ring.

Ring

Network architecture wherein each node in the network may act as an independent router, regardless whether it is connected to another network or not.

Mesh

A group of computers and associated devices that share a common comms line or wireless link.

LAN

Spans a large geographic area, such as a state, province, or county. Often connect multiple smaller networks, such as LANs or MANs.

WAN



Most popular being the internet

Usually interconnects a number of LANs using a high capacity backbone technology such as fiber optical links, and provides uplink services to WANs such as the internet

MAN

Refers to any network that is composed of diffferent interconnected computer networks and also covers an unlimited geographical area.

GAN

A way of sub-dividing a comms system into smaller parts called layers

OSI Model

OSI Layers



Media, signal, and binary transmission.

Layer 1, Physical

OSI Layers



Physical Addressing

Layer 2, Data Link Layer

OSI Layers



Path determination and logical addressing.

Layer 3, Network

OSI Layers



End to end connections and reliability, flow control

Layer 4, Transport

OSI Layers



Interhost comms

Layer 5, Session

OSI Layers



Data representation, encryption and decryption, convert machine dependent data to machine independent data.

Layer 6, Presentation

OSI Layers



Network process to application.

Layer 7, Application

4 Layers of the TCP/IP Model

1. Network Interface


2. Internet


3. Transport


4. Application

TCP/IP Model



Receives packets from the network to be sent over the internet layer.

Network Interface

TCP/IP Model



IP which gets the packets received from the transport layer and adds virtual address information.

Internet Layer

TCP/IP Model



Layer in charge of getting data sent by the upper layer, dividing them into packets and sending them to the internet layer.

Transport Layer

TCP/IP Model



Programs talk to the application layer.

Application Layer

The forth version in the development of the IP and it is the first version of the protocol to be widely deployed.

IPv4

Expansion of IPv4, defined an IP address as a 128-bit number.

IPv6

A global long haul IP based network to support unclass IP data comms services for combat support applications to the DOD, Joint Chiefs, and COCOMs.

NIPRnet

DOD's largest interoperable Command and Control data network, supports:


GCCS


DMS


and numerous other classified warfighter apps

SIPRnet

Operated by the DIA as a secure global network designed to meet the requirements for TS/SCI multimedia, intel comms worldwide.

JWICS

A globally interconnected end to end set of info capabilities for collecting, processing, storing, disseminating, and managing info on demand to warfighters, policy makers, and support personnel.

DOD GIG

The DOD's enterprise network for providing data, video, and voice services

DISN



Defense Info System Network

The major US CONUS shore based Navy network providing SIPR and NIPR connectivity.

NMCI

A Navy-Wide initiative to install a common and secure IT infrastructure to OCONUS Navy locations to access NIPR and SIPR

ONENET

An information transfer strategy that provides network connectivity capable of voice, data, and video for afloat units.

IT21

A system of instructions and data executed directly by a computer's CPU

Machine Language

A type of low level language for programming computers, microprocessors, ,microcontrolers, and other integrated circuits.

Assembly Languages

A programming language with strong abstraction from details of the computer.

High-Level Language

A set of system software programs in a computer that regulate the ways application software programs, use the computer hardware and the ways that users control the computer.

OS

Computer software designed to help the user perform singular or multiple related specific tasks.

Apps

Computer program that can copy itself and infect a computer.

Virus

Self replicating stand alone malware computer programs.

Worms

Malware that appears to perform a desireable function for the user prior to run or install.

Trojan Horse

A method of bypassing normal authentication, securing remote access to a computer, obtaining access to plain text, and so on, while attempting to remain undetected.

Backdoor

The criminally fraudulent process of attempting to acquire sensitive info by masqurading as trust worthy entities in an electronic coms info.

Phishing

Computing activity in which user names and info on groups, shares and services of networked computers are retrieved.

Network Enumeration

Anomoly where a program while writing data to a buffer, over runs the buffer's boundary and overwrites adjacent memory.

Buffer overflow

A code injection technique that exploits a security vulnerability occuring in the database layer of a app.

SQL Injection

Technique for defeating a cipher or mechanism by trying to determine its decryption key or passphrase by searching likely possibilities

Dictionary Attack

Act of exploiting a bug or design flaw in a sofware app to gain access to resources which normally have been protected from an app or user.

Privelege Escalation

Strategy used to break the encryption of data.

Brute Force Attack

Act of manipulating people into performing action or divulging confidential info.

Social Engineering

Set of hardware, software, people, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates.

PKI



Public Key Infrastructure

Hierarchial naming system for computers, services, or any resource connected to the internet or a private network.

DNS



Domain Name System