108: Networks Flashcards

(24 cards)

1
Q

108.1b
Define application server

A

a server that is designed for running specific applications for individual clients to keep resources available for other tasks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

108.1d
Define switch

A

central connection point for network connections that receives a packet at one port, filters it based on the MAC address, and forwards it to the intended destination (OSI layer 2)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

108.1e
Define router

A

a networking device that forwards packets between networks by determining the best path to the destination; work at the network layer (OSI layer 3)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

108.1h
Define firewall

A

a network component placed to help eliminate undesired access; 1st line of defense for the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

108.1k
Define repeater

A

device that receives a signal, cleans it of unnecessary noise, regenerates it, and retransmits it at a higher power level (OSI layer 1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

108.3a
Explain topology

A

the physical arrangement of an area network’s components
- bus: common backbone to connect all devices
- star: features a central connection point
- ring: every device has exactly two neighbors
- mesh: all nodes are connected to each other

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

108.3b
Explain LAN

A

local area network
privately owned network(s) within a single building or campus of up to a few kilometers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

108.3c
Explain WAN

A

wide area network
publicly owned group of networks over a large geographical area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

108.3d
Explain MAN

A

metropolitan area network
slightly larger than LAN; covers a group of buildings or city and can be publicly or privately owned

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

108.4a
Identify the functions, by layer, of the OSI Model

A

(picture bottom up)
7. Application Layer - app2app comms
6. Presentation Layer - data rep and encryption
5. Session Layer - interhost comms
4. Transport Layer - end2end connections
3. Network Layer - path determination and IP addressing
2. Data Link Layer - physical addressing (MAC & LLC)
1. Physical Layer - media, signal and binary transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

108.6a
Define NIPRNET and how its used

A

Nonclassified Internet Protocol Router Network
used to exchange sensitive but unclassified information between internal users as well as provide internet access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

108.6b
Define SIPRNET and how its used

A

Secret Internet Protocol Router Network
interconnected computer networks used to transmit classified information via the TCP/IP protocol suite

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

108.6c
Define JWICS and how its used

A

Joint Worldwide Intelligence Communications Systems
interconnected computer networks used to transmit classified information via packet switching over TCP/IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

108.6d
Define CENTRIXS and how its used

A

Combined Enterprise Regional Information Exchange System
used to connect with select allied countries
transmits classified information via a secure TCP/IP infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

108.10a
Describe network enumeration and the risks associated

A

discovery of hosts and devices on a network in an effort to further identify the function of the remote host, solicit information, and identify the host’s vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

108.10c
Describe SQL injection and the risks associated

A

attack on a system where malicious code is attempted to be run by exploiting an incorrectly filter input statement
malicious code is injected and executed at the same time

17
Q

108.10d
Describe a dictionary attack and the risks associated

A

repeatedly and systematically feeding a system keys and passcodes that are likely to be valid
this is not a brute force attack

18
Q

108.10e
Describe privilege escalation and the risks associated

A

a user gaining access to resources they would not normally be granted

19
Q

108.10i
Describe denial of service (DoS) and the risks associated

A

interruption in an authorized user’s access by malicious intent

20
Q

108.10j
Describe distributed denial of service (DDoS) and the risks associated

A

DoS where multiple systems flood the bandwidth or resources of a targeted system

21
Q

108.11
Describe the functionality of PKI

A

Public Key Infrastructure
secures the electronic transfer of information by using a set of rules, policies, and procedures to manage digital certificates

22
Q

108.12
State the purpose of a Domain Controller, Exchange Server, and DNS

A

domain controller is the server which responds to security authentication requests
exchange server is a Microsoft email server which is usually joined to a trusted domain
DNS is authoritative to its single named IP space

23
Q

108.14
Explain TCP and UPD internet protocols

A

Transmission Control Protocol
provides reliable connection over timely connection

User Datagram Protocol
provides timely connection over reliable connection

24
Q

108.18
State the purpose of active directory

A

Microsoft’s implementation of security domains for centralized management purposes