• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/64

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

64 Cards in this Set

  • Front
  • Back
DEFINE HOST/CLIENT
ANY NETWORK DEVICE WITH AN IP ADDRESS
DEFINE APPLICATION SERVER
CENTRAL POINT WHERE APPLICATIONS ARE HELD
DEFINE HUB
A DEVICE THAT CONNECTS ALL THE SEGMENTS OF THE NETWORK TOGETHER IN A STAR TOPOLOGY
DEFINE ROUTER
USES IP ADDRESS
DEFINE WAP
WIRELESS ACCESS POINT
ALLOWS MOBILE USERS TO CONNECT TO A WIRED NETWORK WIRELESSLY VIA RADIO FREQUENCY TECHNOLOGIES
DEFINE SWITCH
USES MAC ADDRESS
DEFINE PROXY SERVER
USED TO FILTER TRAFFIC AND CACHE WEBSITES
DEFINE FIREWALL
A COMBINATION OF HARDWARE AND SOFTWARE THAT PROTECTS A NETWORK FROM ATTACK BY HACKERS.
DEFINE VPN CONCENTRATOR
DEVICE THAT CREATES REMOTE ACCESS FOR VIRTUAL PRIVATE NETWORKS.
DEFINE BACK UP
A COPY OF SETTINGS OR CONFIGURATION
DEFINE REPEATER
GIVES YOU AN EXTENSION TO YOUR ETHERNET SEGMENT.
DEFINE THE ACCESS LAYER OF ROUTING
INCLUDES HUBS AND SWITCHES. CONNECTS WORKSTATIONS TO THE NETWORK AND ENSURES PACKETS ARE DELIVERED TO THE END USER.
DEFINE THE DISTRIBUTION LAYER OF ROUTING
INCLUDES LAN BASED ROUTERS AND LAYER 3 SWITCHES. ENSURES PACKETS ARE ROUTED BETWEEN SUBNETS AND VLANS.
DEFINE THE CORE LAYER OF ROUTING
INCLUDES HIGH END SIWTCHES AND HIGH SPEED CABLES SUCH AS FIBER. CONCERNED WITH SPEED AND ENSURES RELIABLE DELIVERY OF PACKETS.
DEFINE TOPOLOGY
SHOWS HOW DATA NAVIGATES THROUGH ITS LAYOUT.
DEFINE BUS TOPOLOGY
TWO DISTINCT AND TERMINATED ENDS WITH EACH OF ITS COMPUTERS CONNECTED TO ONE UNBROKEN CABLE.
DEFINE STAR TOPOLOGY
COMPUTERS ARE CONNECTED TO A CENTRAL POINT WITH THIER OWN OR INDIVIDUAL WIRELESS CONNECTION.
DEFINE RING TOPOLOGY
COMPUTERS CONNECT DIRECTLY TO OTHER COMPUTERS WITHIN THE SAME NETWORK
DEFINE MESH TOPOLOGY
A PATH FROM EVERY MACHINE TO EVERY OTHER ON IN THE NETWORK
DEFINE LAN
LOCAL AREA NETWORK
COVERS A CERTAIN GEOGRAPHICAL LOCATION (EX: AN OFFICE BUILDING)
DEFINE WAN
WIDE AREA NETWORK
SPANS A LARGE GEOGRAPHIC AREA
EX: INTERNET
DEFINE MAN
METROPOLITAN AREA NETOWRK
SPANS A LARGE CITY, USUALLY INTERCONNECTS A NUMBER OF LANS AND PROVIDES LINK UP SERVICE TO WANS.
DEFINE GAN
GLOBAL ACCESS NETWORK
EXTENDS MOBLIE VOICE , DATA AND IP MULTIMEDIA APPLICATIONS OVER IP NETWORKS
NAME THE LAYERS OF THE OSI MODEL
APPLICATION
PRESENTATION
SESSION
TRANSPORT
NETWORK
DATA LINK
PHYSICAL
WHAT IS THE APPLICATION LAYER IN THE OSI MODEL
FILE, PRINT, MESSAGE, DATA BASE, APPLICATION SERVICES (USER INTERFACE)
WHATS IS THE PRESENTATION LAYER IN THE OSI MODEL
DATA ENCYRPTION, COMPRESSION, TRANSLATION SERVICES
WHAT IS THE SESSION LAYER IN THE OSI MODEL
DIALOG CONTROL
KEEPS DIFFERENT APPLICATIONS DATA SEPARATE. ESTABLISHES CONNECTIONS
WHAT IS THE TRANSPORT LAYER IN THE OSI MODEL
END TO END CONNECTION, ERROR CORRECTION BEFORE RETRANSMIT
WHAT IS THE NETWORK LAYER IN THE OSI MODEL
ROUTING
LOGICAL ADDRESSING FOR ROUTERS
WHAT IS THE DATA LINK LAYER IN THE OSI MODEL
FRAMING, COMBINE PACKETS INTO BYTES (MAC ADDRESS), ERROR DETECTION
WHAT IS THE PHYSICAL LAYER IN THE OSI MODEL
PHYSICAL TOPOLOGY, MOVES BITS BETWEEN DEVICES, VOLTAGE, PHYSICAL WIRE.
WHAT ARE THE LAYERS OF THE TCP/IP MODEL
PROCESS/APPLICATION
HOST TO HOST
INTERNET
NETWORK ACCESS
WHAT IS THE PROCESS/APPLICATION LAYER OF THE TCP/IP MODEL
APPLICATION, PRESENTATION, SESSION
WHAT IS THE HOST TO HOST LAYER OF THE TCP/IP MODEL
TRANSPORT
WHAT IS THE INTERNET LAYER OF THE TCP/IP MODEL
NETWORK
WHAT IS THE NETWORK ACCESS LAYER OF THE TCP/IP MODEL
DATA LINK/PHYSICAL
WHAT IS THE DIFFERENCE BETWEEN IPV4 AND IPV6
V4 IS 32 BIT
V6 IS 128 BIT
V6 IS MORE SECURE, EASIER TO IMPLEMENT AND MORE ADDRESS SPACE.
DEFINE NIPRNET
NON SECURE INTERNET PROTOCOL ROUTER NETWORK
IS A GLOBAL LONG HAUL IP BASED NETWORK TO SUPPORT UNCLASSIFIED IP DATA COMMUNICATIONS.
DEFINE SIPRNET
SECURE INTERNET PROTOCOL ROUTER NETWORK
COMMAND AND CONTROL DATA NETWORK SUPPORTING CLASSIFIED APPLICATIONS.
DEFINE JWICS
JOINT WORLDWIDE INTELLIGENCE COMMUNICATIONS SYSTEM
SECURE GLOBAL NETWORK DESIGNED FOR TS/SCI INTELLIGENCE COMMUNICATIONS WORLDWIDE.
EXPLAIN THE DODN(GIG) NETWORK
HOW ALL DOD NETWORKS ARE TIED TOGETHER
EXPLAIN DISN
THE DEFENSE INFORMATION SYSTEM NETWORK
PROVIDES VOICE, DATA, AND VIDEO TRANSPORT SERVICES FOR CLASSIFIED AND UNCLASSIFIED USERS
WHAT IS NMCI
THE NAVY/MARINE CORPS INTRANET
NMCI IS A PARTNERSHIP BETWEEN THE NAVY AND INDUSTRY. THE NAVY DOES NOT OWN OR MANAGE THE INFRASTRUCTER.
WHAT IS ONE NET
OCONUS COMMANDS IN EACH REGION OPERATE AND MAINTAIN THIER OWN IT INFRASTRUCTER.
WHAT IS IT-21
PROVIDES NETWORK CONNECTIVITY AFLOAT. USES COTS(COMMERCIAL OFF THE SHELF) TECHNOLOGY.
DEFINE MACHINE LANGUAGE
SYSTEM OF INSTRUCTIONS AND DATA EXECUTED BY THE CPU.
DEFINE ASSEMBLY LANGUAGE
LOW LEVEL PROGRAMMING LANGUAGE
FOR COMPUTERS.
DEFINE HIGH LEVEL LANGUAGE
ADVANCED COMPUTER PROGRAMMING LANGUAGE THAT IS NOT LIMITED BY THE COMPUTER, MORE EASILY UNDERDSTOOD.
DEFINE OPERATING SYSTEM
AN INTERFACE BETWEEN HARDWARE AND USER.
DEFINE APPLICATION
COMPUTER SOFTWARE DESIGNED TO HELP THE USER PERFORM SPECIFIC TASKS.
WHAT IS A VIRUS
COMPUTER PROGRAM THAT CAN COPY ITSELF AND INFECT A COMPUTER.
WHAT IS A WORM
SELF REPLICATING MALWARE COMPUTER PROGRAM.
WHAT IS A TROJAN
MALWARE THAT APPEARS TO PERFORM A DISIRABLE FUNCTION TO THE USER.
DEFINE BACKDOOR
MEATHOD OF BYPASSING NORMAL AUTHENTICATION, SECURING REMOTE ACCESS TO A COMPUTER.
DEFINE PHISHING
THE CRIMINALLY FRAUDULENT PROCESS OF ATTEMPTING TO ACQUIRE SENSITIVE INFORMATION.
WHAT IS NETWORK ENUMERATION
COMPUTER PROGRAM USED TO RETRIEVE USER NAMES, INFO ON GROUPS, SHARES AND SERVICES OF NETWORKED COMPUTERS.
DEFINE BUFFER OVERFLOW
WHEN ATEMPTING TO PUT MORE DATA IN THE BUFFER THAN IT CAN HOLD AND IT OVERWRITES DATA.
DEFINE SQL INJECTION
A CODE INJECTION TECHNIQUE THAT EXPLOITS A SECURITY VULNERABILITY OCCURRING IN THE DATABASE LAYER OF AN APPLICATION.
DEFINE DICTIONARY ATTACK
A TECHNIQUE FOR DEFEATING AN AUTHENTICATION MECHANISM BY SEARCHING LIKELY POSSIBILITIES
DEFINE PRIVILEGE ESCALATION
ACT OF EXPLOTING A BUG OR DESIGN FLAW TO GAIN ELEVATED ACCESS.
DEFINE SOCIAL ENGINEERING
ACT OF MANIPULATING PEOPLE INTO PERFORMING ACTIONS OR DIVULGING CONFIDENTIAL INFORMATION.
DEFINE BRUTE FORCE ATTACK
SYSTEMATICALLY CHECKING ALL POSSIBLE KEYS UNTIL THE CORRECT KEY IS FOUND.
DESCRIBE PKI
BINDS PUBLIC KEYS WITH USER IDENTITES BY MEANS OF CERTIFICATE AUTHORITY.
STATE THE PURPOSE OF DNS
DOMAIN NAMING SYSTEM
CONVERTS HOST NAMES TO IP ADDRESSES