Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
63 Cards in this Set
- Front
- Back
Define the following term: Host/Client |
Host/Client architecture allows for multiple clients to connect and share resources on a host(s) servers
|
|
Define the following term: Application Server |
Is a server that is designed for or dedicated to running specific applications for individual clients in order to keep resources available for other tasks |
|
Hub |
Is a device for connecting multiple twisted pair of fiber optic Ethernet devices together and making them act as a single network segment |
|
Switch |
Is a computer networking device that connects network segments
|
|
Define the following term: Router |
|
|
Define the following term: WAP |
|
|
Define the following term: Proxy Server |
Is a server (a computer system or an application program) that acts as an intermediary for requests from clients seeking resources from other servers |
|
Firewall |
Is a device which is configured to permit or deny computer applications/services based upon a set of rules and other criteria
|
|
VPN Concentrator |
Device that provides coast saving through flexible, reliable, and high performance connectivity via remote-access solutions over public or non-secure physical liens
|
|
Back-up |
|
|
Repeater |
|
|
Access |
Access routers, including small officer/home office (SOHO) model, are located at customers sites such as branch offices that do not need hierarchical routing of their own |
|
Define the following layers of routing and common devices associated with: Distribution |
Distribution routers aggregate traffic from multiple access routers, either at the same site, or to collect the data streams from multiple sites to a major enterprise location. Distribution routers often are responsible for enforcing quality of service across WAN, so they may have considerable memory, multiple WAN interfaces, and substantial processing intelligence |
|
Define the following layers of routing and common devices associated with: Core |
A core router may provide a "collapsed backbone" interconnecting the distribution tier routers from multiple buildings of a campus, or large enterprise locations. They tend to be optimized for high bandwidth |
|
Star Network |
One of the most common computer network topologies. In its simplest form, a star network consists of one central switch, hub, or computer, which acts as a conduit to transmit messages |
|
Explain the following network terminology:
Bus Network |
Architecture in which a set of clients are connected via a shard communication line. If the terminal or client goes offline, anything behind it in the line is also offline |
|
Explain the following network terminology:
Ring Network |
Each node is connected to exactly two other nodes, forming a ring |
|
Explain the following network terminology:
Mesh Network |
Components are all connected directly to every other component |
|
Explain the following network terminology: LAN |
Local Area Network - is a computer network covering a small physical area, like a home, office, or small group of buildings |
|
Explain the following network terminology: WAN |
Wide Area Network is a computer network that covers a broad area (i.e. any network whose communications links across metropolitan, regional, or national boundaries) |
|
Explain the following network terminology: MAN |
Metropolitan Area Network is a large computer network that usually spans a city or large campus |
|
GAN |
Global Area Network is a network that is composed of different interconnected computer networks and covers an unlimited geographical area (JWICS) |
|
Identify functions, by layer, of the OSI Model
|
1 - Physical Layer 2 - Data Link Layer 3 - Network Layer 4 - Transport Layer 5 - Session Layer 6 - Presentation Layer 7 - Application Layer |
|
Identify functions, by layer, of the OSI Model Layer 1 |
Physical Layer - The electrical and physical specifications for the device. In particular, it defines the relationship between a device and a transition medium this includes the layout of hubs, repeater and network adapters |
|
Identify functions, by layer, of the OSI Model Layer 2 |
Data Link Layer - Provided the functional and procedural means to transfer data between network entities and to detect and possibly correct errors that may occur in the Physical layer(e.g. Ethernet)
|
|
Identify functions, by layer, of the OSI Model Layer 3 |
Network Layer: Provides the functional and procedural means of transferring variable length data sequences from a source to a destination via one or more networks, while maintaining the quality of service requested by the Transport Layer (e.g. Router) |
|
Identify functions, by layer, of the OSI Model Layer 4 |
Transport Later: Provides transparent transfer of data between end users, providing reliable data transfer services to the upper layers. The transport Layer controls the reliability of a given link through flow control, segmentation/de-segmentation, and error control. Uses TCP/UDP protocols |
|
Identify functions, by layer, of the OSI Model Layer 5 |
Session Layer: Controls the connections (sessions) between computers. Its establishes, manages and terminates the connections between the local and remote application. |
|
Identify functions, by layer, of the OSI Model Layer 6 |
Presentation Layer: Transforms data to provide a standard interface for the Application layer (e.g. JPEG, GIF, MPEG) |
|
Identify functions, by layer, of the OSI Model Layer 7 |
Application Layer: Interfaces directly to and performs common application services for the application process (e.g. HTTP, FTP,SMTP) |
|
Identify functions, by layer, of the TCP/IP Model Transmission control/internet protocol |
Layer 2 - Internet Layer Layer 3 - Transport Layer Layer 4 - Application Layer |
|
Identify functions, by layer, of the TCP/IP Model Layer 1 |
Network Layer - The physical equipment necessary for communications, such as twisted pair cables, the signaling used on that equipment, and the low level protocols using that signaling |
|
Identify functions, by layer, of the TCP/IP Model Layer 2 |
|
|
Identify functions, by layer, of the TCP/IP Model Layer 3 |
Transport Layer - Responsible for end-to-end message transfer capabilities independent of the underlying network, along with error control, segmentation, flow control, congestion control, and application addressing. |
|
Identify functions, by layer, of the TCP/IP Model Layer 4 |
Application Layer - Refers to the higher-level protocols used by most applications for network communication. |
|
State the difference between Ipv4 and Ipv6 |
Ipv6 uses 128 bit addresses 2^128 addresses |
|
Define the following and how they are used: NIPRNET |
NIPRNET: The Non-secure Internet Protocol Router Network (NIPRnet) is used to exchange sensitive but unclassified information between internal users. DoD owned and created by DISA |
|
Define the following and how they are used: SIPRNET |
SIPRNER: The secret internet protocol router network(SIPRNet) is a system of interconnected computer networks used to transmit classified information up to SECRET |
|
Define the following and how they are used: JWICS |
JWICS - The joint worldwide intelligence communication system is a system of interconnected computer networks used to transmit classified information up to top secret and SCI |
|
Explain the following networks and where they are employed: DoDN(GIG) |
DoD Network the Global Information Grid defined as a globally interconnected end-to-end set of information capabilities for collecting processing, storing, disseminating, and managing info on demand to the warfighter, policy makers, and support personnel |
|
Explain the following networks and where they are employed: DISN |
Defense Information Systems Network - is the DoD enterprise network for providing data, video, and voice services |
|
Explain the following networks and where they are employed: NMCI |
Navy/Marine Corps Intranet - is a DoN program where information Technology services have been outsourced to an outside contractor. Deployed throughout the Navy and Marine Corps. |
|
Explain the following networks and where they are employed: ONENET |
OCONUS Navy Network - is a Navy-wide initiative to install a common and secure IT infrastructure to OCONUS Navy locations. It is based on NMCI architecture and is designed to be interoperable with IT-21, NMCI, and the Global Information Grid |
|
Explain the following networks and where they are employed: IT21 |
IT21 - Information Technology for the 21st Century. Provide intelligent solutions customized to their customers specific challenges and enable them to be efficient and to benefit from the advance technology |
|
Describe the following: Machine Language |
Machine language is the "natural language" of a particular computer, defined by the computer's hardware design. 1's and 0's |
|
Describe the following: Assembly Language |
|
|
Describe the following: High-level language |
Computer usage increased rapidly with the advent of assembly language, but programmers in these languages still required many instructions to accomplish even the simplest tasks. To speed up the process, high level languages were developed in which single statements could be written to perform substantial tasks
|
|
Describe the following: Operating System |
|
|
Application |
Any program designed to perform a specific function directly for the user or in some cases for another application program. |
|
Virus |
|
|
Describe the following to include the risks associated: Worm |
A self-replicating virus that does not alter files but resides in the active memory and duplicates itself. This causes the system to slow or halt completely. It uses a network to send copies of itself to other nodes and it may do so without user intervention |
|
Describe the following to include the risks associated: Trojan |
A program that appears legitimate, but performs illicit activity when it runs. It may be used to locate password information of make the system more vulnerable
|
|
Describe the following to include the risks associated: Backdoor |
A remote administration utility that, once installed on a computer, allows a user to access and control it over a network of the internet.
|
|
Phishing |
The criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details, by masquerading as a trustworthy entity in an electronic communication |
|
Describe function and risk associated with the following activities: Network Enumeration |
A computing activity in which user names and info on groups, shares and services of networked computers are retrieved. This can expose vulnerabilities that lead to unauthorized access and havoc |
|
Describe function and risk associated with the following activities: Buffer Overflow |
An anomaly where a process stores data in a buffer outside the memory the programmer set aside for it. This may result in erratic program behavior, including memory access errors, incorrect results, program termination, or a breach of system security
|
|
SQL Injection |
An attack in which malicious code is inserted into strings that are later passed to an instance of SQL Server for parsing execution. |
|
Dictionary Attack |
|
|
Privilege Escalation |
The act of exploiting a bug or design flaw in a software application to gain access to resources which normally would have been protected from an application or user |
|
Brute Force Attack |
|
|
Social Engineering |
The practice of tricking a user into giving, or giving access, to sensitive information, thereby bypassing most or all protection
|
|
Describe the functionality of PKI
|
Public Key Infrastructure. Set of hardware, software, people, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates. In cryptography, a PKI is an arrangement that binds public keys with respective user identities by means of a certificate of authority.
|
|
State the purpose of DNS
|
Domain Name System - translates domain names meaningful to humans into the numerical identifiers associated with networking equipment for the purpose of locating and addressing these devices worldwide. |