Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
62 Cards in this Set
- Front
- Back
Describes the relationship between 2 computer programs in which one program, the client, makes a service request from another program, the server, which fulfills the request. |
Host/Client |
|
A software framework dedicated to the efficient execution of procedures for supporting the construction of apps. |
Application Server |
|
A common connection point for devices in a network, commonly used to connect segments of a LAN. |
Hub |
|
A small hardware device that joins multiple computers together within one LAN. |
Switch |
|
Device that forwards data packets between networks, creating an overlay internework. |
Router |
|
Standard that describes a protocol suite allowing the interoperability of WAP equipment and software with many different network technologies. |
Wireless Application Protocol |
|
Server that acts as an intermediary for request from clients seeking resources from other servers. |
Proxy Server |
|
Device or set of devices designed to permit or deny network transmission based upon a set of rules and is frequently used to protect networks from unauthorized access while permitting legitimate comms to pass. |
Firewall |
|
Device that incorporates the most advanced encryption and authentication techniques available and are built specifically for creating a remote access or site to site VPN and ideally are deployed where the requirement is for a single device to handle a very large number or VPN tunnels. |
VPN Concentrator |
|
Process of making copies of data so that these additional copies may be used to restore the original after a data loss event. |
Back-Up |
|
Devices that regenerate incoming electrical, wireless, or optical signals. |
Repeater |
|
What are the 3 layers of routing? |
Access Distribution Core |
|
A network architechture in which a set of clients are connected via a shared comms line. |
Bus |
|
Topology that consists of one central switch, hub, or computer, which acts as a conduit to transmit messages. |
Star |
|
Network architecture in which each node connects to exactly 2 other nodes, forming a single continuous pathway for signals through each node or ring. |
Ring |
|
Network architecture wherein each node in the network may act as an independent router, regardless whether it is connected to another network or not. |
Mesh |
|
A group of computers and associated devices that share a common comms line or wireless link. |
LAN |
|
Spans a large geographic area, such as a state, province, or county. Often connect multiple smaller networks, such as LANs or MANs. |
WAN
Most popular being the internet |
|
Usually interconnects a number of LANs using a high capacity backbone technology such as fiber optical links, and provides uplink services to WANs such as the internet |
MAN |
|
Refers to any network that is composed of diffferent interconnected computer networks and also covers an unlimited geographical area. |
GAN |
|
A way of sub-dividing a comms system into smaller parts called layers |
OSI Model |
|
OSI Layers
Media, signal, and binary transmission. |
Layer 1, Physical |
|
OSI Layers
Physical Addressing |
Layer 2, Data Link Layer |
|
OSI Layers
Path determination and logical addressing. |
Layer 3, Network |
|
OSI Layers
End to end connections and reliability, flow control |
Layer 4, Transport |
|
OSI Layers
Interhost comms |
Layer 5, Session |
|
OSI Layers
Data representation, encryption and decryption, convert machine dependent data to machine independent data. |
Layer 6, Presentation |
|
OSI Layers
Network process to application. |
Layer 7, Application |
|
4 Layers of the TCP/IP Model |
1. Network Interface 2. Internet 3. Transport 4. Application |
|
TCP/IP Model
Receives packets from the network to be sent over the internet layer. |
Network Interface |
|
TCP/IP Model
IP which gets the packets received from the transport layer and adds virtual address information. |
Internet Layer |
|
TCP/IP Model
Layer in charge of getting data sent by the upper layer, dividing them into packets and sending them to the internet layer. |
Transport Layer |
|
TCP/IP Model
Programs talk to the application layer. |
Application Layer |
|
The forth version in the development of the IP and it is the first version of the protocol to be widely deployed. |
IPv4 |
|
Expansion of IPv4, defined an IP address as a 128-bit number. |
IPv6 |
|
A global long haul IP based network to support unclass IP data comms services for combat support applications to the DOD, Joint Chiefs, and COCOMs. |
NIPRnet |
|
DOD's largest interoperable Command and Control data network, supports: GCCS DMS and numerous other classified warfighter apps |
SIPRnet |
|
Operated by the DIA as a secure global network designed to meet the requirements for TS/SCI multimedia, intel comms worldwide. |
JWICS |
|
A globally interconnected end to end set of info capabilities for collecting, processing, storing, disseminating, and managing info on demand to warfighters, policy makers, and support personnel. |
DOD GIG |
|
The DOD's enterprise network for providing data, video, and voice services |
DISN
Defense Info System Network |
|
The major US CONUS shore based Navy network providing SIPR and NIPR connectivity. |
NMCI |
|
A Navy-Wide initiative to install a common and secure IT infrastructure to OCONUS Navy locations to access NIPR and SIPR |
ONENET |
|
An information transfer strategy that provides network connectivity capable of voice, data, and video for afloat units. |
IT21 |
|
A system of instructions and data executed directly by a computer's CPU |
Machine Language |
|
A type of low level language for programming computers, microprocessors, ,microcontrolers, and other integrated circuits. |
Assembly Languages |
|
A programming language with strong abstraction from details of the computer. |
High-Level Language |
|
A set of system software programs in a computer that regulate the ways application software programs, use the computer hardware and the ways that users control the computer. |
OS |
|
Computer software designed to help the user perform singular or multiple related specific tasks. |
Apps |
|
Computer program that can copy itself and infect a computer. |
Virus |
|
Self replicating stand alone malware computer programs. |
Worms |
|
Malware that appears to perform a desireable function for the user prior to run or install. |
Trojan Horse |
|
A method of bypassing normal authentication, securing remote access to a computer, obtaining access to plain text, and so on, while attempting to remain undetected. |
Backdoor |
|
The criminally fraudulent process of attempting to acquire sensitive info by masqurading as trust worthy entities in an electronic coms info. |
Phishing |
|
Computing activity in which user names and info on groups, shares and services of networked computers are retrieved. |
Network Enumeration |
|
Anomoly where a program while writing data to a buffer, over runs the buffer's boundary and overwrites adjacent memory. |
Buffer overflow |
|
A code injection technique that exploits a security vulnerability occuring in the database layer of a app. |
SQL Injection |
|
Technique for defeating a cipher or mechanism by trying to determine its decryption key or passphrase by searching likely possibilities |
Dictionary Attack |
|
Act of exploiting a bug or design flaw in a sofware app to gain access to resources which normally have been protected from an app or user. |
Privelege Escalation |
|
Strategy used to break the encryption of data. |
Brute Force Attack |
|
Act of manipulating people into performing action or divulging confidential info. |
Social Engineering |
|
Set of hardware, software, people, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates. |
PKI
Public Key Infrastructure |
|
Hierarchial naming system for computers, services, or any resource connected to the internet or a private network. |
DNS
Domain Name System |