108 Networks Flashcards

1
Q

Host/Client

A

Host- a computer connected to a computer network or the internet
Client- a application or system that accesses a remote service on another computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Application Server

A

computer which houses the application programs to ‘serve’ them to client computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Hub

A

a hardware device that is used to network multiple computers together

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Switch

A

hardware device used to network multiple computers together

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Router

A

a hardware device that routes data from a LAN to another network connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

WAP

A

Wireless Access Point- a device, such as a wireless router, that allows wireless devices to connect to a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Proxy Server

A

a server that all computers on the local network have to go through before accessing information on the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Firewall

A

can be either hardware or software based. limit the data that can pass through it and protects a networked server or client machine from damage by unauthorized users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

VPN Concentrator

A

Used to create encrypted tunnels between hosts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Back-up

A

the process of backing up refers to making copies of data so that these additional copies may be used to restore the original after a data loss event

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Repeater

A

a wireless repeater is a device used to increase the effective coverage of our wireless network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Layers of routing

A

Access- desktop layer
Distribution- LAN-based and layer 3 switches
Core- core of the network, backbone, high-end switches and high-speed cables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Topology

A

interconnection of the various elements of a computer network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

LAN

A

computer network covering a small physical area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

WAN

A

computer group that covers a broad area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

MAN

A

large computer network that usually spans a city or large campus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

GAN

A

network used for supporting mobile communications across an arbitrary number of wireless LANs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

OSI Model

A

Physical-signal transmission
Data Link-delivery and receipt of data
Network-routing packets across the network
Transport- end-to-end transport of data
Session- communications sessions between machines
Presentation- preparing the data for different interfaces
Application- supports application and end-user processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

TCP/IP Model

A

Network Access Layer- physically sent
Internet Layer- packages data into IP datagrams
Transport Layer- comms session management between host computers
Application Layer-how host protocols interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

IPV4

A

connectionless protocol - 32 bits

21
Q

IPV6

A

vastly larger address space than IPV4 -128 bits

22
Q

NIPRNET

A

used for processing information up to Unclassified

23
Q

SIPRNET

A

used for processing information up to Secret

24
Q

JWICS

A

used for processing information up to SCI

25
DoDN (GIG)
all encompassing communications project of the US DoD
26
DISN
DOD consolidated worldwide enterprise level telecommunications infrastructure that provides end-to-end info transfer
27
NMCI
primary network for continental US users
28
ONE-NET
common and secure infrastructure to OCONUS Navy locations
29
IT21
serves as primary network for afloat commands
30
Machine Language
lowest-level programming language
31
Assembly Language
programmers use either high-level programming language or assembly language
32
High-Level Language
programming language with strong abstraction from the details of the computer
33
Operating System
software consisting of programs and data that runs on computers
34
Application
Computer Software designed to help the user perform singular or multiple related specific tasks
35
Virus
can only spread from one computer to another
36
Worm
self-replicating computer program
37
Trojan
malware that appears to perform a desirable function for the user prior to run or install, but instead, facilities unauthorized access of the users computer system
38
Backdoor
method of bypassing normal authentication
39
Phishing
criminally fraudulent process of attempting to acquire sensitive info such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communications
40
Network Enumeration
discovering as much as possible about the target, identifying al potential avenues of attack, and attempting to compromise a network
41
Buffer Overflow
occurs when a program or process tries to store more data in a buffer than it was intended to hold
42
SQL Injection
type of security exploit in which the attacker adds SQL code o a Web for input box to gain access to resources or make changes to data
43
Dictionary Attack
defeating cipher or authentication mechanism by trying to determine its decryption key or paraphrase by looking in the dictionary
44
Privilege Escalation
act of exploiting a bug or design flaw in software app to gain access to resources that would normally be protected from an app or user
45
Brute Force Attack
used to break encryption of data
46
Social Engineering
act of manipulating people into performing actions or divulging confidential information
47
Public Key Infrastructure (PKI)
a framework for creating a secure method for exchanging information based on public key cryptography
48
Purpose of DNS
Domain Name Service- translated internet domain and host names to IP addresses