108 Networks Flashcards

1
Q

Define Host/Client

A

Main computer that’s connected to other computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define Application Server

A

Runs only specific applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define Hub

A

Common connection point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a switch?

A

Common connection point but smarter. Only forwards packets to intended recipient port.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define Router

A

Joins multiple wired or wireless networks together

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define WAP

A

WAP: Wireless Access Protocol; Open international standard for application-layer network communications in a wireless communication environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a Proxy Server?

A

Controls client access to the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a Firewall?

A

Blocks unauthorized access while permitting authorized communications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a VPN?

A

VPN: Virtual Private Network; Built for creating remote access VPNs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define Back-up

A

Making copies of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define Repeater

A

Regenerate incoming electrical, wireless, or optical signals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define the following layers of routing and common devices associated with each:

  • Access
  • Distribution
  • Core
A
  • Access: Routers located at customer sites
  • Distribution: Aggregate traffic from multiple access routers to a major enterprise location
  • Core: Provide a collapsed backbone interconnecting distribution tier routers from multiple buildings of a campus or large enterprise locations
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Topology?

A

Topology: System Architecture (4 types)

  • Bus: Set of clients are connected via a shared communication line
  • Star: All devices are connected to a central hub
  • Ring: Network in which each node connects to exactly two other nodes, forming a ring
  • Mesh: Network in which all components are connected to every component
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Define LAN

A

LAN: Local Area Network; Computer network covering a small physical area (home, office)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Define WAN

A

WAN: Wide Area Network; Network covering broad area (i.e. NSA NET/NMCI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Define MAN

A

MAN: Metropolitan Area Network; Large computer network (college campus)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Define GAN

A

GAN: Global Area Network; Composed of different interconnected computer networks and covers an unlimited geographical area (internet/Google)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are the layers of the OSI model?

A

OSI Model (7 layers):

  • Application
  • Presentation
  • Network
  • Session
  • Data link
  • Transport
  • Physical
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are the layers of the TCP/IP Model?

A

TCP/IP Model (4 layers):

  • Application
  • Transport
  • Internet
  • Network interface
20
Q

State the difference between IPv4 and IPv6

A

IPv6 has a vastly larger address space than IPv4.

  • IPv6 uses 128-bit address
  • IPv4 uses 32 bits
21
Q

Define NIPRNET and how it is used

A

NIPRNET: Non-secure Internet Protocol Router Network.

- Unclassified network. DoD owned and created by DISA

22
Q

Define SIPRNET and how it is used

A

SIPRNET: Secure Internet Protocol Router Network.
- Secret level network. Supports DoD, Law enforcement, Dept. of Homeland Security, deployed to every embassy & military command

23
Q

Define JWICS and how it is used

A

JWICS: Joint Worldwide Intelligence Communications System

- Connects all members of DoD intelligence IS community; Operates TS/SI/TK/US only level of SCI portion of DISN

24
Q

Explain DoDN GIG and how it is employed

A

DoDN GIG: Dept. of Defense Network; Global Information Grid

25
Explain DISN and how it is employed
DISN: Defense Information System Network
26
Explain NMCI and how it is employed
NMCI: Navy/Marine Corps Intranet; deployed throughout the Navy and Marine Corps. Interoperable with ONENET (CONUS/Shore stations)
27
Explain ONENET
Navy-wide initiative to install a common and secure IT infrastructure to OCONUS Navy locations
28
Explain IT21
IT21: For afloat units. Interoperable with ONENET
29
What is machine language?
Machine language generally consists of strings of numbers (ultimately reduced to 1s and 0s) that instruct computers to perform their most elementary operations at a time
30
What is assembly language?
Assembly language is low level programming language using the human readable instructions of CPU (Step by Step instructions for people)
31
What is High-Level Language?
Enables a programmer to write programs that are more or less independent of a particular computer
32
What is an Operating System?
Responsible for management & coordination of activities and sharing of resources of computers. Acts as a host for computing applications run on machines.
33
What is an Application?
Program designed to perform specific functions directly for the user.
34
Describe a Virus and the risks associated
Designed to infect, destroy, modify, or cause other problems
35
Describe a Worm and the risks associated
Self-replicating virus
36
Describe a Trojan and the risks associated
Appears legitimate, but performs some illicit activity when run
37
Describe Backdoor and the risks associated
Remote admin utility that allows a user access and control it over a network
38
Describe a Phishing and the risks associated
Illegal process of attempting to acquire sensitive information
39
What is the function of Network Enumeration and the risk associated?
Computing activity in which user names, and information on groups, shares and services of networked computers are retrieved to later exploit
40
What is the function of Buffer Overflow and the risk associated?
Anomaly where a process stores data in buffer outside the memory the programmer set aside for it
41
What is the function of SQL Injection and the risk associated?
Malicious code is inserted into strings
42
What is the function of Dictionary Attack and the risk associated?
Method of breaking into a password -protected computer by entering every word in dictionary
43
What is the function of Privilege Escalation and the risk associated?
Act of exploiting a bug or design flaw to gain access to resources
44
What is the function of Brute Force Attack and the risk associated?
Used to break an encryption by trying all possibilities
45
What is the function of Social Engineering and the risk associated?
Tricking a user into giving access to sensitive information
46
Describe the functionality of PKI
An arrangement that bings public keys with respective user identities by means of a certificate authority (CA). User ID must be unique within each CA domain
47
State the purpose of DNS
Translates domain names into the numerical identifiers associated with networking