Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
36 Cards in this Set
- Front
- Back
Host/Client |
Client/Host architecture allows for multiple clients to connect and share resources on host servers |
|
Application server |
a server that is dedicated to running specific applications |
|
Hub |
central connection point for network connections that contain multiple ports (OSI Layer 1 physical) |
|
Switch |
Central connection point for network connections that contain multiple ports (OSI Layer 2 Data Link) |
|
Router |
a networking device that forwards packets between networks by determining the best path to the destination (OSI Layer 3 Networking) |
|
WAP |
Wireless Application Protocol |
|
Proxy Server |
a server that acts an intermediary for request from clients seeking resources from other servers |
|
Firewall |
The first line of a defense for a network |
|
Back-up |
Making copies of data so that these additional copies may be used to restore the original after a data loss event |
|
Repeater |
an electronic device that rx a signal, cleans it of unnecessary noise, regenerates it, and retransmits it at a higher power level. (OSI Layer 1) |
|
Topology |
Physical arrangement of LAN components |
|
Bus |
uses common backbone to connect all devices |
|
Star |
features a central connection point called a hub |
|
Ring |
Every device has exactly two neighbor for communication purposes |
|
Mesh |
a network where nodes are connected to each other |
|
LAN |
Local Area Network |
|
WAN |
Wide Area Network |
|
MAN |
Metropolitan Area Network |
|
GAN |
Global Area Network |
|
OSI Model |
1. Physical Layer 2. Data Link Layer 3. Networking layer 4. Transport Layer 5. Session Layer 6. Presentation 7. Application Layer |
|
TCP/IP Model |
1. Application Layer 2. Transport Layer 3. Internet Layer 4. Network Access Layer |
|
NIPRNET |
Non classified Internet Protocol Router Network |
|
SIPRNET |
Secret Internet Protocol Router Network |
|
JWICS |
Joint Worldwide Intelligence Communications Systems
|
|
NMCI |
Navy and Marine Corps Intranet |
|
Virus |
Malicious code written with an intention to damage the user's computer |
|
Worm |
Self replicating malware |
|
Trojan |
it is a harmful piece of software that looks legitimate |
|
Backdoor |
set of programs that a hacker installs on a target system to allow access at a later time. |
|
Phishing |
criminally fraudulent process of attempting to acquire sensitive info such as username, passwords, etc. by masquerading as a legit entity in an electronic communication |
|
Network Enumeration |
A computing activity in which usernames, etc, are retrieved |
|
Buffer Overflow |
A situation where a program writes data beyond the buffer space allocated in memory. |
|
Brute Force Attack |
strategy used to break the encryption of data |
|
Social Engineering |
the act of manipulating people into performing actions of divulging confidential info. |
|
PKI |
Public Key Infrastructure |
|
DNS |
Domain Name System; turns alphabetic Domain Names into numeric IP addresses |