Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
49 Cards in this Set
- Front
- Back
Define Host/Client-host
|
Main computer connected to other computers.
|
|
Define Application Server
|
In a client server network it runs specific applications |
|
Define Hub
|
Common connection point in a network. Data comes in 1 port, goes out all ports.
|
|
Define Switch
|
addresses |
|
Define Router |
Joins multiple networks together. Wired or wireless |
|
Define Wireless Access Protocol
|
communications. ie. mobile web on mobile phone |
|
Define Proxy Server
|
Controls client access to the internet |
|
Define Firewall
|
Permits or denies access of computer applications |
|
Define Virtual Private Network |
public networks |
|
Define VPN Concentrator
|
Creates remote access VPN's with high availability, performance, and scalability |
|
Define Back-up
|
Making copies of data used to restore after a data loss event |
|
Define Repeater
|
A way to preserve signal integrity and extend a signals distance. A way to beat signal degradation |
|
Define Topology in reference to networks
|
network. |
|
State the 4 types of Network Topologies
|
2) Star 3) Ring 4) Mesh |
|
Describe a Bus Topology
|
media. If 1 device goes down, the other devices behind it are also offline. 1 single point of failure. |
|
Describe a Star Topology
|
Devices are connected to a central hub. If the hub goes down so does the network. 1 single point of failure. |
|
Describe a Ring Topology |
Each node is connected to exactly two other nodes forming a ring. |
|
Describe a Mesh Topology
|
All devices are connected directly to each other. |
|
Define a Local Area Network
|
LAN. Covers a small physical area. ie. home, office |
|
Define a Wide Area Network |
WAN. Covers a broad area. ie. a network that crosses metropolitan or national borders. |
|
Define a Metropolitan Area Network
|
Large network that usually spans a city or large campus |
|
Define a Global Area Network
|
unlimited geographical area. ie. JWICS, NIPR |
|
List the layer of the OSI Model
|
Layer 2) Data Link Layer 3) Network Layer 4) Transport Layer 5) Session Layer 6) Presentation Layer 7) Application |
|
Define the Physical Layer of the OSI Model |
|
|
Define the Data Link Layer of the OSI Model
|
networks. Switches operate at this level. |
|
Define the Network Layer of the OSI Model
|
Provides the means of transferring variable amounts of data using one or more networks. Routers operate at this level.
|
|
Define the Transport Layer of the OSI Model
|
Provides transparent transfer of data between end users. TCP/UDP Protocols operate at this level.
|
|
Define the Session Layer of the OSI Model
|
Controls the connections between computers. |
|
Define the Presentation Layer of the OSI Model
|
Interface. |
|
Define the Application Layer of the OSI Model
|
itself. |
|
List the 4 layers of the TCP/IP Model
|
Layer 1) Network Layer 2) Internet Layer 3) Transport Layer 4) Application |
|
State the difference between IPv4 and IPv6
|
IPv6 uses 128-bit addressing |
|
Define Nonsecure Internet Protocol Router Network |
NIPRNet. Used to exchange unclassified information. Allows users access to the Internet. DoD owned, created by DISA |
|
Define Secure Internet Protocol Router Network
|
SIPRNet. Used to exchange classified information up to and including SECRET via TCP/IP protocol suite. |
|
Define Joint Worldwide Intelligence Communications System |
JWICS. Used to exchange classified information up to and including TOP SECRET and SCI via TCP/IP packet switching.
|
|
Describe what a Virus is
|
infect, destroy, modify, or cause other problems with your computer or software programs. |
|
Describe what a Worm is
|
resides in active memory and duplicates itself. |
|
Describe what a Trojan is
|
Program that appears legitimate, but performs illicit activity when it is run. |
|
Describe what a Backdoor is |
Remote administration utility that, once installed, allows a user access and control over a network or the Internet. |
|
Describe what Phising is
|
acquire sensitive information by pretending to be a trustworthy entity in electronic communications. |
|
Define Network Enumeration |
networked computers is retrieved. |
|
Define Buffer Overflow
|
A process stores data in a buffer outside the designated memory space and it overwrites adjacent memory locations |
|
Define SQL Injection
|
Malicious code is inserted into strings that are later passed to an instance of SQL Server for execution
|
|
Define Dictionary Attack
|
A method that systematically enters every word in a dictionary as the password |
|
Define Privilege Escalation |
Exploiting a bug or design flaw in a software application. |
|
Define Brute Force Attack
|
A technique that uses all possibilities of encryption or authentication. Usually takes half as long as there are possibilities. |
|
Define Social Engineering
|
Fancy lying |
|
Define Public Key Infrastructure
|
PKI. An arrangement that binds public keys to a Certificate Authority. |
|
State the purpose of a Domain Name System
|
Translates domain names into IP addresses and vice versa. The Internet's phonebook |