• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/36

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

36 Cards in this Set

  • Front
  • Back

Host/Client

Client/Host architecture allows for multiple clients to connect and share resources on host servers

Application server

a server that is dedicated to running specific applications

Hub

central connection point for network connections that contain multiple ports (OSI Layer 1 physical)

Switch

Central connection point for network connections that contain multiple ports (OSI Layer 2 Data Link)

Router

a networking device that forwards packets between networks by determining the best path to the destination (OSI Layer 3 Networking)

WAP

Wireless Application Protocol

Proxy Server

a server that acts an intermediary for request from clients seeking resources from other servers

Firewall

The first line of a defense for a network

Back-up

Making copies of data so that these additional copies may be used to restore the original after a data loss event

Repeater

an electronic device that rx a signal, cleans it of unnecessary noise, regenerates it, and retransmits it at a higher power level. (OSI Layer 1)

Topology

Physical arrangement of LAN components

Bus

uses common backbone to connect all devices

Star

features a central connection point called a hub

Ring

Every device has exactly two neighbor for communication purposes

Mesh

a network where nodes are connected to each other

LAN

Local Area Network

WAN

Wide Area Network

MAN

Metropolitan Area Network

GAN

Global Area Network

OSI Model

1. Physical Layer


2. Data Link Layer


3. Networking layer


4. Transport Layer


5. Session Layer


6. Presentation


7. Application Layer

TCP/IP Model

1. Application Layer


2. Transport Layer


3. Internet Layer


4. Network Access Layer

NIPRNET

Non classified Internet Protocol Router Network

SIPRNET

Secret Internet Protocol Router Network

JWICS

Joint Worldwide Intelligence Communications Systems


NMCI

Navy and Marine Corps Intranet

Virus

Malicious code written with an intention to damage the user's computer

Worm

Self replicating malware

Trojan

it is a harmful piece of software that looks legitimate

Backdoor

set of programs that a hacker installs on a target system to allow access at a later time.

Phishing

criminally fraudulent process of attempting to acquire sensitive info such as username, passwords, etc. by masquerading as a legit entity in an electronic communication

Network Enumeration

A computing activity in which usernames, etc, are retrieved

Buffer Overflow

A situation where a program writes data beyond the buffer space allocated in memory.

Brute Force Attack

strategy used to break the encryption of data

Social Engineering

the act of manipulating people into performing actions of divulging confidential info.

PKI

Public Key Infrastructure

DNS

Domain Name System; turns alphabetic Domain Names into numeric IP addresses