NETWORKS 108 Flashcards Preview

EIWS > NETWORKS 108 > Flashcards

Flashcards in NETWORKS 108 Deck (31):
1

Host/Client

Host: main computer; Other computers: Clients

2

Hub

Common connection point for devices in a network

3

Switch

Same as hub, only smarter; forwards the packet to intended recipient port

4

Router

A device that forwards data across computer networks. Connects networks.

5

Proxy Server

Acts as an intermediary for requests from clients seeking resources from other servers, ie internet

6

Firewall

A device configured to permit or deny applications upon a set of rules

7

VPN

Provides a secure tunnel connecting two hosts or networks

8

LAN

Covers a small physical office or home

9

WAN

Covers a broad area

10

MAN

Usually spans a city or large campus

11

GAN

Network composed of different interconnected computer networks and covers an unlimited geographical area

12

OSI Layers

Layer 1: Physical
Layer 2: Data Link
Layer 3: Network
Layer 4: Transport
Layer 5: Session
Layer 6: Presentation
Layer 7: Application

13

TCP/IP Layers

Layer 1: Network Interface
Layer 2: Internet
Layer 3: Transport
Layer 4: Application

14

What is the difference between IPv4 and IPv6

32bit and 128bit

15

SIPRNET

Secret Internet Protocol Router Network

16

NIPRNET

Non-classified Internet Protocol Router Network

17

JWICS

Joint Worldwide Intelligence Communications System

18

CSI

Cyber Security Inspection

19

DNS

Domain Name Server translates domain names to IP addresses

20

Virus

Software program designed to infect, destroy, modify, or cause other issues with your computer

21

Worm

Self-replicating virus that does not alter files, but resides in the active memory and duplicates itself

22

Trojan

A program that appears legitimate, but performs some illicit activity when it’s ran

23

Backdoor

Remote administration that, once installed on a computer, allows a user access and control of it over a network or the internet

24

Phishing

Criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card info by masquerading as a trustworthy entity in an e-mail

25

Network enumeration

A computing activity in which usernames and info on groups, shares and services of networked computers are retrieved

26

Buffer Overflow

An anomaly where a process stores data in a buffer outside the memory the programmer set aside for it

27

SQL Injection

An attack in which malicious code is inserted into strings that are later passed to an instance of SQL server for parsing and execution

28

Dictionary Attack

Method of breaking into a password-protected computer or server by systematically entering every word in a dictionary as a password

29

Privilege Escalation

Act of exploiting a bug or design flaw in a software application to gain access to resources which normally would have been protected from an application or user

30

Brute Force Attack

Technique used to break an encryption or authentication system by trying all possibilities

31

Social Engineering

Practice of tricking a user into giving, or giving access to, sensitive information thereby bypassing most or all protection