• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/49

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

49 Cards in this Set

  • Front
  • Back
Define Host/Client-host
Main computer connected to other computers.
Define Application Server

In a client server network it runs specific


applications

Define Hub
Common connection point in a network. Data comes in 1 port, goes out all ports.
Define Switch


Smarter Hub. Data is sent to specific hardware


addresses


Define Router

Joins multiple networks together. Wired or wireless
Define Wireless Access Protocol


WAP. Standard for application layer network


communications. ie. mobile web on mobile phone

Define Proxy Server

Controls client access to the internet
Define Firewall

Permits or denies access of computer applications

Define Virtual Private Network


VPN. Allows confidential communication over


public networks

Define VPN Concentrator

Creates remote access VPN's with high availability, performance, and scalability
Define Back-up

Making copies of data used to restore after a data loss event
Define Repeater

A way to preserve signal integrity and extend a


signals distance. A way to beat signal degradation

Define Topology in reference to networks


The physical interconnections of a computer


network.

State the 4 types of Network Topologies


1) Bus


2) Star


3) Ring


4) Mesh

Describe a Bus Topology


Devices are connected using a single shared


media. If 1 device goes down, the other devices behind it are also offline. 1 single point of failure.

Describe a Star Topology

Devices are connected to a central hub. If the hub goes down so does the network. 1 single point of failure.

Describe a Ring Topology

Each node is connected to exactly two other nodes forming a ring.
Describe a Mesh Topology

All devices are connected directly to each other.
Define a Local Area Network

LAN. Covers a small physical area. ie. home, office

Define a Wide Area Network

WAN. Covers a broad area. ie. a network that crosses metropolitan or national borders.
Define a Metropolitan Area Network

Large network that usually spans a city or large campus
Define a Global Area Network


GAN. Interconnected networks that cover an


unlimited geographical area. ie. JWICS, NIPR

List the layer of the OSI Model


Layer 1) Physical


Layer 2) Data Link


Layer 3) Network


Layer 4) Transport


Layer 5) Session


Layer 6) Presentation


Layer 7) Application


Define the Physical Layer of the OSI Model


The electrical and physical layout of devices. How information gets from one place to another. Cables and Hubs work at this level.



Define the Data Link Layer of the OSI Model


Provides the means to transfer data between


networks. Switches operate at this level.

Define the Network Layer of the OSI Model
Provides the means of transferring variable amounts of data using one or more networks. Routers operate at this level.
Define the Transport Layer of the OSI Model
Provides transparent transfer of data between end users. TCP/UDP Protocols operate at this level.
Define the Session Layer of the OSI Model

Controls the connections between computers.
Define the Presentation Layer of the OSI Model


Transforms data to provide a Graphical User


Interface.

Define the Application Layer of the OSI Model


Interfaces directly with the application process


itself.

List the 4 layers of the TCP/IP Model

Layer 1) Network


Layer 2) Internet


Layer 3) Transport


Layer 4) Application



State the difference between IPv4 and IPv6


IPv4 uses 32-bit addressing


IPv6 uses 128-bit addressing

Define Nonsecure Internet Protocol Router


Network

NIPRNet. Used to exchange unclassified


information. Allows users access to the Internet. DoD owned, created by DISA

Define Secure Internet Protocol Router Network

SIPRNet. Used to exchange classified information up to and including SECRET via TCP/IP protocol suite.

Define Joint Worldwide Intelligence


Communications System

JWICS. Used to exchange classified information up to and including TOP SECRET and SCI via TCP/IP packet switching.
Describe what a Virus is


Software program, script, or macro designed to


infect, destroy, modify, or cause other problems with your computer or software programs.

Describe what a Worm is


Self-replicating virus that doesn't alter files but


resides in active memory and duplicates itself.

Describe what a Trojan is

Program that appears legitimate, but performs illicit activity when it is run.


Describe what a Backdoor is

Remote administration utility that, once installed, allows a user access and control over a network or the Internet.
Describe what Phising is


Criminally fraudulent process of attempting to


acquire sensitive information by pretending to be a trustworthy entity in electronic communications.


Define Network Enumeration


Computing activity in which information of


networked computers is retrieved.

Define Buffer Overflow

A process stores data in a buffer outside the


designated memory space and it overwrites


adjacent memory locations

Define SQL Injection
Malicious code is inserted into strings that are later passed to an instance of SQL Server for execution
Define Dictionary Attack

A method that systematically enters every word in a dictionary as the password

Define Privilege Escalation

Exploiting a bug or design flaw in a software


application.

Define Brute Force Attack

A technique that uses all possibilities of encryption or authentication. Usually takes half as long as there are possibilities.
Define Social Engineering


Tricking a user into giving up the information.


Fancy lying

Define Public Key Infrastructure

PKI. An arrangement that binds public keys to a Certificate Authority.
State the purpose of a Domain Name System

Translates domain names into IP addresses and vice versa. The Internet's phonebook