• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/63

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

63 Cards in this Set

  • Front
  • Back

Define the following term:


Host/Client

Host/Client architecture allows for multiple clients to connect and share resources on a host(s) servers

Define the following term:


Application Server

Is a server that is designed for or dedicated to running specific applications for individual clients in order to keep resources available for other tasks


Define the following term:


Hub


Is a device for connecting multiple twisted pair of fiber optic Ethernet devices together and making them act as a single network segment


Define the following term:


Switch

Is a computer networking device that connects network segments

Define the following term:


Router


Is a device that interconnects two or more computer networks, and selectively interchanges packets of data between them

Define the following term:


WAP


Is a open international standard for application-layer network communications in a wireless-communication environment


Define the following term:


Proxy Server


Is a server (a computer system or an application program) that acts as an intermediary for requests from clients seeking resources from other servers


Define the following term:


Firewall

Is a device which is configured to permit or deny computer applications/services based upon a set of rules and other criteria


Define the following term:


VPN Concentrator

Device that provides coast saving through flexible, reliable, and high performance connectivity via remote-access solutions over public or non-secure physical liens


Define the following term:


Back-up


Up-to-date network resources that are available on hand if network files become corrupt and or/unusable




Define the following term:


Repeater


Is an electronic device that receives a signal and retransmits it at a higher level and or/higher power, or onto the other side of an obstruction, so that the signal can cover longer distances


Define the following layers of routing and common devices associated with:


Access


Access routers, including small officer/home office (SOHO) model, are located at customers sites such as branch offices that do not need hierarchical routing of their own

Define the following layers of routing and common devices associated with:


Distribution


Distribution routers aggregate traffic from multiple access routers, either at the same site, or to collect the data streams from multiple sites to a major enterprise location. Distribution routers often are responsible for enforcing quality of service across WAN, so they may have considerable memory, multiple WAN interfaces, and substantial processing intelligence

Define the following layers of routing and common devices associated with:


Core


A core router may provide a "collapsed backbone" interconnecting the distribution tier routers from multiple buildings of a campus, or large enterprise locations. They tend to be optimized for high bandwidth


Explain the following network terminology:


Star Network


One of the most common computer network topologies. In its simplest form, a star network consists of one central switch, hub, or computer, which acts as a conduit to transmit messages
Explain the following network terminology:

Bus Network



Architecture in which a set of clients are connected via a shard communication line. If the terminal or client goes offline, anything behind it in the line is also offline
Explain the following network terminology:

Ring Network



Each node is connected to exactly two other nodes, forming a ring
Explain the following network terminology:

Mesh Network



Components are all connected directly to every other component

Explain the following network terminology:


LAN


Local Area Network - is a computer network covering a small physical area, like a home, office, or small group of buildings

Explain the following network terminology:


WAN

Wide Area Network is a computer network that covers a broad area (i.e. any network whose communications links across metropolitan, regional, or national boundaries)

Explain the following network terminology:


MAN


Metropolitan Area Network is a large computer network that usually spans a city or large campus


Explain the following network terminology:


GAN


Global Area Network is a network that is composed of different interconnected computer networks and covers an unlimited geographical area (JWICS)
Identify functions, by layer, of the OSI Model


Please Do Not Throw Sausage Pizza Away


1 - Physical Layer


2 - Data Link Layer


3 - Network Layer


4 - Transport Layer


5 - Session Layer


6 - Presentation Layer


7 - Application Layer

Identify functions, by layer, of the OSI Model


Layer 1


Physical Layer - The electrical and physical specifications for the device. In particular, it defines the relationship between a device and a transition medium this includes the layout of hubs, repeater and network adapters

Identify functions, by layer, of the OSI Model


Layer 2

Data Link Layer - Provided the functional and procedural means to transfer data between network entities and to detect and possibly correct errors that may occur in the Physical layer(e.g. Ethernet)

Identify functions, by layer, of the OSI Model


Layer 3


Network Layer: Provides the functional and procedural means of transferring variable length data sequences from a source to a destination via one or more networks, while maintaining the quality of service requested by the Transport Layer (e.g. Router)

Identify functions, by layer, of the OSI Model


Layer 4


Transport Later: Provides transparent transfer of data between end users, providing reliable data transfer services to the upper layers. The transport Layer controls the reliability of a given link through flow control, segmentation/de-segmentation, and error control. Uses TCP/UDP protocols

Identify functions, by layer, of the OSI Model


Layer 5


Session Layer: Controls the connections (sessions) between computers. Its establishes, manages and terminates the connections between the local and remote application.

Identify functions, by layer, of the OSI Model


Layer 6


Presentation Layer: Transforms data to provide a standard interface for the Application layer (e.g. JPEG, GIF, MPEG)

Identify functions, by layer, of the OSI Model


Layer 7


Application Layer: Interfaces directly to and performs common application services for the application process (e.g. HTTP, FTP,SMTP)

Identify functions, by layer, of the TCP/IP Model


Transmission control/internet protocol


Layer 1 - Network Layer


Layer 2 - Internet Layer


Layer 3 - Transport Layer


Layer 4 - Application Layer

Identify functions, by layer, of the TCP/IP Model


Layer 1


Network Layer - The physical equipment necessary for communications, such as twisted pair cables, the signaling used on that equipment, and the low level protocols using that signaling

Identify functions, by layer, of the TCP/IP Model


Layer 2


Internet Layer - Defines IP addresses, with many routing schemes for navigating packets from one IP address to another

Identify functions, by layer, of the TCP/IP Model


Layer 3


Transport Layer - Responsible for end-to-end message transfer capabilities independent of the underlying network, along with error control, segmentation, flow control, congestion control, and application addressing.

Identify functions, by layer, of the TCP/IP Model


Layer 4


Application Layer - Refers to the higher-level protocols used by most applications for network communication.

State the difference between Ipv4 and Ipv6


Ipv3 uses 32-bit addresses 2^32 addresses


Ipv6 uses 128 bit addresses 2^128 addresses

Define the following and how they are used:


NIPRNET


NIPRNET: The Non-secure Internet Protocol Router Network (NIPRnet) is used to exchange sensitive but unclassified information between internal users. DoD owned and created by DISA

Define the following and how they are used:


SIPRNET


SIPRNER: The secret internet protocol router network(SIPRNet) is a system of interconnected computer networks used to transmit classified information up to SECRET

Define the following and how they are used:


JWICS


JWICS - The joint worldwide intelligence communication system is a system of interconnected computer networks used to transmit classified information up to top secret and SCI

Explain the following networks and where they are employed:


DoDN(GIG)


DoD Network the Global Information Grid defined as a globally interconnected end-to-end set of information capabilities for collecting processing, storing, disseminating, and managing info on demand to the warfighter, policy makers, and support personnel

Explain the following networks and where they are employed:


DISN


Defense Information Systems Network - is the DoD enterprise network for providing data, video, and voice services

Explain the following networks and where they are employed:


NMCI


Navy/Marine Corps Intranet - is a DoN program where information Technology services have been outsourced to an outside contractor. Deployed throughout the Navy and Marine Corps.

Explain the following networks and where they are employed:


ONENET


OCONUS Navy Network - is a Navy-wide initiative to install a common and secure IT infrastructure to OCONUS Navy locations. It is based on NMCI architecture and is designed to be interoperable with IT-21, NMCI, and the Global Information Grid

Explain the following networks and where they are employed:


IT21


IT21 - Information Technology for the 21st Century. Provide intelligent solutions customized to their customers specific challenges and enable them to be efficient and to benefit from the advance technology

Describe the following:


Machine Language


Machine language is the "natural language" of a particular computer, defined by the computer's hardware design. 1's and 0's

Describe the following:


Assembly Language


English-like abbreviations were designed to represent machine language instructions. These abbreviations formed the basis of assembly language.

Describe the following:


High-level language

Computer usage increased rapidly with the advent of assembly language, but programmers in these languages still required many instructions to accomplish even the simplest tasks. To speed up the process, high level languages were developed in which single statements could be written to perform substantial tasks

Describe the following:


Operating System


An interface between hardware and user. Windows, Max OS


Describe the following:


Application


Any program designed to perform a specific function directly for the user or in some cases for another application program.


Describe the following to include the risks associated:


Virus


Virus: Software program, script, or macro designed to infect, destroy, modify, or cause other problems with your computer or software programs.

Describe the following to include the risks associated:


Worm


A self-replicating virus that does not alter files but resides in the active memory and duplicates itself. This causes the system to slow or halt completely. It uses a network to send copies of itself to other nodes and it may do so without user intervention

Describe the following to include the risks associated:


Trojan

A program that appears legitimate, but performs illicit activity when it runs. It may be used to locate password information of make the system more vulnerable

Describe the following to include the risks associated:


Backdoor

A remote administration utility that, once installed on a computer, allows a user to access and control it over a network of the internet.


Describe the following to include the risks associated:


Phishing


The criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details, by masquerading as a trustworthy entity in an electronic communication

Describe function and risk associated with the following activities:


Network Enumeration


A computing activity in which user names and info on groups, shares and services of networked computers are retrieved. This can expose vulnerabilities that lead to unauthorized access and havoc

Describe function and risk associated with the following activities:


Buffer Overflow

An anomaly where a process stores data in a buffer outside the memory the programmer set aside for it. This may result in erratic program behavior, including memory access errors, incorrect results, program termination, or a breach of system security


Describe function and risk associated with the following activities:


SQL Injection


An attack in which malicious code is inserted into strings that are later passed to an instance of SQL Server for parsing execution.


Describe function and risk associated with the following activities:


Dictionary Attack


A method of breaking into a password-protected computer or server by systematically entering every word in a dictionary as a password.


Describe function and risk associated with the following activities:


Privilege Escalation


The act of exploiting a bug or design flaw in a software application to gain access to resources which normally would have been protected from an application or user


Describe function and risk associated with the following activities:


Brute Force Attack


A technique used to break an encryption or authentication system by trying all possibilities. This usually only take about half as many tries as there are possibilities


Describe function and risk associated with the following activities:


Social Engineering

The practice of tricking a user into giving, or giving access, to sensitive information, thereby bypassing most or all protection
Describe the functionality of PKI
Public Key Infrastructure. Set of hardware, software, people, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates. In cryptography, a PKI is an arrangement that binds public keys with respective user identities by means of a certificate of authority.
State the purpose of DNS

Domain Name System - translates domain names meaningful to humans into the numerical identifiers associated with networking equipment for the purpose of locating and addressing these devices worldwide.