Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
64 Cards in this Set
- Front
- Back
DEFINE HOST/CLIENT
|
ANY NETWORK DEVICE WITH AN IP ADDRESS
|
|
DEFINE APPLICATION SERVER
|
CENTRAL POINT WHERE APPLICATIONS ARE HELD
|
|
DEFINE HUB
|
A DEVICE THAT CONNECTS ALL THE SEGMENTS OF THE NETWORK TOGETHER IN A STAR TOPOLOGY
|
|
DEFINE ROUTER
|
USES IP ADDRESS
|
|
DEFINE WAP
|
WIRELESS ACCESS POINT
ALLOWS MOBILE USERS TO CONNECT TO A WIRED NETWORK WIRELESSLY VIA RADIO FREQUENCY TECHNOLOGIES |
|
DEFINE SWITCH
|
USES MAC ADDRESS
|
|
DEFINE PROXY SERVER
|
USED TO FILTER TRAFFIC AND CACHE WEBSITES
|
|
DEFINE FIREWALL
|
A COMBINATION OF HARDWARE AND SOFTWARE THAT PROTECTS A NETWORK FROM ATTACK BY HACKERS.
|
|
DEFINE VPN CONCENTRATOR
|
DEVICE THAT CREATES REMOTE ACCESS FOR VIRTUAL PRIVATE NETWORKS.
|
|
DEFINE BACK UP
|
A COPY OF SETTINGS OR CONFIGURATION
|
|
DEFINE REPEATER
|
GIVES YOU AN EXTENSION TO YOUR ETHERNET SEGMENT.
|
|
DEFINE THE ACCESS LAYER OF ROUTING
|
INCLUDES HUBS AND SWITCHES. CONNECTS WORKSTATIONS TO THE NETWORK AND ENSURES PACKETS ARE DELIVERED TO THE END USER.
|
|
DEFINE THE DISTRIBUTION LAYER OF ROUTING
|
INCLUDES LAN BASED ROUTERS AND LAYER 3 SWITCHES. ENSURES PACKETS ARE ROUTED BETWEEN SUBNETS AND VLANS.
|
|
DEFINE THE CORE LAYER OF ROUTING
|
INCLUDES HIGH END SIWTCHES AND HIGH SPEED CABLES SUCH AS FIBER. CONCERNED WITH SPEED AND ENSURES RELIABLE DELIVERY OF PACKETS.
|
|
DEFINE TOPOLOGY
|
SHOWS HOW DATA NAVIGATES THROUGH ITS LAYOUT.
|
|
DEFINE BUS TOPOLOGY
|
TWO DISTINCT AND TERMINATED ENDS WITH EACH OF ITS COMPUTERS CONNECTED TO ONE UNBROKEN CABLE.
|
|
DEFINE STAR TOPOLOGY
|
COMPUTERS ARE CONNECTED TO A CENTRAL POINT WITH THIER OWN OR INDIVIDUAL WIRELESS CONNECTION.
|
|
DEFINE RING TOPOLOGY
|
COMPUTERS CONNECT DIRECTLY TO OTHER COMPUTERS WITHIN THE SAME NETWORK
|
|
DEFINE MESH TOPOLOGY
|
A PATH FROM EVERY MACHINE TO EVERY OTHER ON IN THE NETWORK
|
|
DEFINE LAN
|
LOCAL AREA NETWORK
COVERS A CERTAIN GEOGRAPHICAL LOCATION (EX: AN OFFICE BUILDING) |
|
DEFINE WAN
|
WIDE AREA NETWORK
SPANS A LARGE GEOGRAPHIC AREA EX: INTERNET |
|
DEFINE MAN
|
METROPOLITAN AREA NETOWRK
SPANS A LARGE CITY, USUALLY INTERCONNECTS A NUMBER OF LANS AND PROVIDES LINK UP SERVICE TO WANS. |
|
DEFINE GAN
|
GLOBAL ACCESS NETWORK
EXTENDS MOBLIE VOICE , DATA AND IP MULTIMEDIA APPLICATIONS OVER IP NETWORKS |
|
NAME THE LAYERS OF THE OSI MODEL
|
APPLICATION
PRESENTATION SESSION TRANSPORT NETWORK DATA LINK PHYSICAL |
|
WHAT IS THE APPLICATION LAYER IN THE OSI MODEL
|
FILE, PRINT, MESSAGE, DATA BASE, APPLICATION SERVICES (USER INTERFACE)
|
|
WHATS IS THE PRESENTATION LAYER IN THE OSI MODEL
|
DATA ENCYRPTION, COMPRESSION, TRANSLATION SERVICES
|
|
WHAT IS THE SESSION LAYER IN THE OSI MODEL
|
DIALOG CONTROL
KEEPS DIFFERENT APPLICATIONS DATA SEPARATE. ESTABLISHES CONNECTIONS |
|
WHAT IS THE TRANSPORT LAYER IN THE OSI MODEL
|
END TO END CONNECTION, ERROR CORRECTION BEFORE RETRANSMIT
|
|
WHAT IS THE NETWORK LAYER IN THE OSI MODEL
|
ROUTING
LOGICAL ADDRESSING FOR ROUTERS |
|
WHAT IS THE DATA LINK LAYER IN THE OSI MODEL
|
FRAMING, COMBINE PACKETS INTO BYTES (MAC ADDRESS), ERROR DETECTION
|
|
WHAT IS THE PHYSICAL LAYER IN THE OSI MODEL
|
PHYSICAL TOPOLOGY, MOVES BITS BETWEEN DEVICES, VOLTAGE, PHYSICAL WIRE.
|
|
WHAT ARE THE LAYERS OF THE TCP/IP MODEL
|
PROCESS/APPLICATION
HOST TO HOST INTERNET NETWORK ACCESS |
|
WHAT IS THE PROCESS/APPLICATION LAYER OF THE TCP/IP MODEL
|
APPLICATION, PRESENTATION, SESSION
|
|
WHAT IS THE HOST TO HOST LAYER OF THE TCP/IP MODEL
|
TRANSPORT
|
|
WHAT IS THE INTERNET LAYER OF THE TCP/IP MODEL
|
NETWORK
|
|
WHAT IS THE NETWORK ACCESS LAYER OF THE TCP/IP MODEL
|
DATA LINK/PHYSICAL
|
|
WHAT IS THE DIFFERENCE BETWEEN IPV4 AND IPV6
|
V4 IS 32 BIT
V6 IS 128 BIT V6 IS MORE SECURE, EASIER TO IMPLEMENT AND MORE ADDRESS SPACE. |
|
DEFINE NIPRNET
|
NON SECURE INTERNET PROTOCOL ROUTER NETWORK
IS A GLOBAL LONG HAUL IP BASED NETWORK TO SUPPORT UNCLASSIFIED IP DATA COMMUNICATIONS. |
|
DEFINE SIPRNET
|
SECURE INTERNET PROTOCOL ROUTER NETWORK
COMMAND AND CONTROL DATA NETWORK SUPPORTING CLASSIFIED APPLICATIONS. |
|
DEFINE JWICS
|
JOINT WORLDWIDE INTELLIGENCE COMMUNICATIONS SYSTEM
SECURE GLOBAL NETWORK DESIGNED FOR TS/SCI INTELLIGENCE COMMUNICATIONS WORLDWIDE. |
|
EXPLAIN THE DODN(GIG) NETWORK
|
HOW ALL DOD NETWORKS ARE TIED TOGETHER
|
|
EXPLAIN DISN
|
THE DEFENSE INFORMATION SYSTEM NETWORK
PROVIDES VOICE, DATA, AND VIDEO TRANSPORT SERVICES FOR CLASSIFIED AND UNCLASSIFIED USERS |
|
WHAT IS NMCI
|
THE NAVY/MARINE CORPS INTRANET
NMCI IS A PARTNERSHIP BETWEEN THE NAVY AND INDUSTRY. THE NAVY DOES NOT OWN OR MANAGE THE INFRASTRUCTER. |
|
WHAT IS ONE NET
|
OCONUS COMMANDS IN EACH REGION OPERATE AND MAINTAIN THIER OWN IT INFRASTRUCTER.
|
|
WHAT IS IT-21
|
PROVIDES NETWORK CONNECTIVITY AFLOAT. USES COTS(COMMERCIAL OFF THE SHELF) TECHNOLOGY.
|
|
DEFINE MACHINE LANGUAGE
|
SYSTEM OF INSTRUCTIONS AND DATA EXECUTED BY THE CPU.
|
|
DEFINE ASSEMBLY LANGUAGE
|
LOW LEVEL PROGRAMMING LANGUAGE
FOR COMPUTERS. |
|
DEFINE HIGH LEVEL LANGUAGE
|
ADVANCED COMPUTER PROGRAMMING LANGUAGE THAT IS NOT LIMITED BY THE COMPUTER, MORE EASILY UNDERDSTOOD.
|
|
DEFINE OPERATING SYSTEM
|
AN INTERFACE BETWEEN HARDWARE AND USER.
|
|
DEFINE APPLICATION
|
COMPUTER SOFTWARE DESIGNED TO HELP THE USER PERFORM SPECIFIC TASKS.
|
|
WHAT IS A VIRUS
|
COMPUTER PROGRAM THAT CAN COPY ITSELF AND INFECT A COMPUTER.
|
|
WHAT IS A WORM
|
SELF REPLICATING MALWARE COMPUTER PROGRAM.
|
|
WHAT IS A TROJAN
|
MALWARE THAT APPEARS TO PERFORM A DISIRABLE FUNCTION TO THE USER.
|
|
DEFINE BACKDOOR
|
MEATHOD OF BYPASSING NORMAL AUTHENTICATION, SECURING REMOTE ACCESS TO A COMPUTER.
|
|
DEFINE PHISHING
|
THE CRIMINALLY FRAUDULENT PROCESS OF ATTEMPTING TO ACQUIRE SENSITIVE INFORMATION.
|
|
WHAT IS NETWORK ENUMERATION
|
COMPUTER PROGRAM USED TO RETRIEVE USER NAMES, INFO ON GROUPS, SHARES AND SERVICES OF NETWORKED COMPUTERS.
|
|
DEFINE BUFFER OVERFLOW
|
WHEN ATEMPTING TO PUT MORE DATA IN THE BUFFER THAN IT CAN HOLD AND IT OVERWRITES DATA.
|
|
DEFINE SQL INJECTION
|
A CODE INJECTION TECHNIQUE THAT EXPLOITS A SECURITY VULNERABILITY OCCURRING IN THE DATABASE LAYER OF AN APPLICATION.
|
|
DEFINE DICTIONARY ATTACK
|
A TECHNIQUE FOR DEFEATING AN AUTHENTICATION MECHANISM BY SEARCHING LIKELY POSSIBILITIES
|
|
DEFINE PRIVILEGE ESCALATION
|
ACT OF EXPLOTING A BUG OR DESIGN FLAW TO GAIN ELEVATED ACCESS.
|
|
DEFINE SOCIAL ENGINEERING
|
ACT OF MANIPULATING PEOPLE INTO PERFORMING ACTIONS OR DIVULGING CONFIDENTIAL INFORMATION.
|
|
DEFINE BRUTE FORCE ATTACK
|
SYSTEMATICALLY CHECKING ALL POSSIBLE KEYS UNTIL THE CORRECT KEY IS FOUND.
|
|
DESCRIBE PKI
|
BINDS PUBLIC KEYS WITH USER IDENTITES BY MEANS OF CERTIFICATE AUTHORITY.
|
|
STATE THE PURPOSE OF DNS
|
DOMAIN NAMING SYSTEM
CONVERTS HOST NAMES TO IP ADDRESSES |