108: Networks Flashcards

1
Q

108.1a
Define Host/Client

A

architecture that allows multiple users to connect and share resources on the same server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

108.1b
Define application server

A

a server that is designed for running specific applications for individual clients to keep resources available for other tasks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

108.1c
Define hub

A

central connection point for network connections that receives a packet at one port and copies it unmodified to all other ports (OSI layer 1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

108.1d
Define switch

A

central connection point for network connections that receives a packet at one port, filters it based on the MAC address, and forwards it to the intended destination (OSI layer 2)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

108.1e
Define router

A

a networking device that forwards packets between networks by determining the best path to the destination; work at the network layer (OSI layer 3)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

108.1f
Define WAP

A

wireless access point
physical wireless device for accessing the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

108.1g
Define proxy server

A

a server that acts as an intermediary for requests from clients seeking resources from other users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

108.1h
Define firewall

A

a network component placed to help eliminate undesired access; 1st line of defense for the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

108.1i
Define VPN concentrator

A

broadcast point for hidden IPs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

108.1j
Define backup

A

making data copies that can be restored after a data loss event

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

108.1k
Define repeater

A

device that receives a signal, cleans it of unnecessary noise, regenerates it, and retransmits it at a higher power level (OSI layer 1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

108.2a
Define the access layer of routing

A

located at customer sites such as branch offices that don’t need hierarchical routing of their own

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

108.2b
Define the distribution layer of routing

A

aggregate traffic from multiple access routers either at the same site or to collect the data and send it to a major enterprise location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

108.2c
Define the core layer of routing

A

provide a “collapsible backbone” interconnecting distribution tier routers from multiple buildings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

108.3a
Explain topology

A

the physical arrangement of an area network’s components
- bus: common backbone to connect all devices
- star: features a central connection point
- ring: every device has exactly two neighbors
- mesh: all nodes are connected to each other

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

108.3b
Explain LAN

A

local area network
privately owned network(s) within a single building or campus of up to a few kilometers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

108.3c
Explain WAN

A

wide area network
publicly owned group of networks over a large geographical area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

108.3d
Explain MAN

A

metropolitan area network
slightly larger than LAN; covers a group of buildings or city and can be publicly or privately owned

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

108.3e
Explain GAN

A

global area network
used to support mobile communications across a number of wireless LANs, satellite coverage areas, etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

108.3f
Explain VLAN

A

virtual local area network
enables devices from multiple networks to be combined to a single logical network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

108.4a
Identify the functions, by layer, of the OSI Model

A

(picture bottom up)
7. Application Layer - app2app comms
6. Presentation Layer - data rep and encryption
5. Session Layer - interhost comms
4. Transport Layer - end2end connections
3. Network Layer - path determination and IP addressing
2. Data Link Layer - physical addressing (MAC & LLC)
1. Physical Layer - media, signal and binary transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

108.4b
Identify the functions, by layer, of the TCP/IP Model

A

(picture bottom up)
4. Application Layer - Telnet, FTP, SMTP
3. Transport Layer - TCP, UDP
2. Internet Layer - IP
1. Network Access Layer - Ethernet, Token ring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

108.5
State the difference between IPv4 and IPv6

A

IPv4 utilizes 32 bits for addressing
IPv6 utilizes 128 bits for addressing (allowing for more possible address combinations)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

108.6a
Define NIPRNET and how its used

A

Nonclassified Internet Protocol Router Network
used to exchange sensitive but unclassified information between internal users as well as provide internet access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

108.6b
Define SIPRNET and how its used

A

Secret Internet Protocol Router Network
interconnected computer networks used to transmit classified information via the TCP/IP protocol suite

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

108.6c
Define JWICS and how its used

A

Joint Worldwide Intelligence Communications Systems
interconnected computer networks used to transmit classified information via packet switching over TCP/IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

108.6d
Define CENTRIXS and how its used

A

Combined Enterprise Regional Information Exchange System
used to connect with select allied countries
transmits classified information via a secure TCP/IP infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

108.7a
Explain CANES and where its employed

A

Consolidated Afloat Network Enterprise Services
newest network architecture/system in the fleet
consolidates 4 legacy afloat networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

108.7b
Explain DoDIN (GIG) and where its employed

A

DoD Information Network (formerly Global Information Grid)
globally connected, end2end set of information capabilities for managing information on demand

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

108.7c
Explain DISN and where its employed

A

Defense Information System Network
DoD’s worldwide enterprise level telecommunications infrastructure providing end2end information transfer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

108.7d
Explain NMCI and where its employed

A

Navy/Marine Corps Intranet
developed to procure and manage IT for the Navy at the enterprise level
partnership between the Navy and the industry

32
Q

108.7e
Explain ONENET and where its employed

A

Navy-wide initiative to install a common and secure IT infrastructure to OCONUS navy locations
based on NMCI infrastructure architecture and designed to be interoperable

33
Q

108.7f
Explain IT21/ISNS and where its employed

A

IT21:
secret version of CANES
idependently administered but centrally governed by the CNO

ISNS:
Integrated Shipboard Network System
legacy predecessor to CANES

34
Q

108.8a
Describe Machine Language

A

the natural language of a computer, defined by its hardware design
consists of strings of numbers (1s and 0s)

35
Q

108.8b
Describe Assembly Language

A

English-like abbreviations used by programmers that represent elementary operations

36
Q

108.8c
Describe High-Level Language

A

programming languages such as C, C++, and Java

37
Q

108.8d
Describe Operating System

A

software that controls a computer and provides an interface for the user

38
Q

108.8e
Describe Application

A

computer software designed to perform a singular task or multiple related tasks

39
Q

108.9a
Describe a virus and the risks associated

A

malicious code written with the intention to damage the computer
can attach to other files or boot sectors

40
Q

108.9b
Describe a worm and the risks associated

A

self-replicating malware
uses a computer network to send copies of itself to other nodes
does not need to attach itself to an existing program

41
Q

108.9c
Describe a trojan and the risks associated

A

malware that appears to perform a desirable function but instead facilitates unauthorized access to the computer system

42
Q

108.9d
Describe a backdoor and the risks associated

A

a gap in the security of a computer intentionally left open to permit continuous access without restrictions
hackers may do this after a system is compromised

43
Q

108.9e
Describe phishing and the risks associated

A

type of social engineering where users are baited into giving up sensitive information

44
Q

108.10a
Describe network enumeration and the risks associated

A

discovery of hosts and devices on a network in an effort to further identify the function of the remote host, solicit information, and identify the host’s vulnerabilities

45
Q

108.10b
Describe buffer overflow and the risks associated

A

attack on a system where a program writing to memory buffer exceeds the bounds of memory control
causes erratic program behavior, computer crashes, DoS, etc

46
Q

108.10c
Describe SQL injection and the risks associated

A

attack on a system where malicious code is attempted to be run by exploiting an incorrectly filter input statement
malicious code is injected and executed at the same time

47
Q

108.10d
Describe a dictionary attack and the risks associated

A

repeatedly and systematically feeding a system keys and passcodes that are likely to be valid
this is not a brute force attack

48
Q

108.10e
Describe privilege escalation and the risks associated

A

a user gaining access to resources they would not normally be granted

49
Q

108.10f
Describe brute force attack and the risks associated

A

feeding a system all possible passphrases, checking every possible combination of characters

50
Q

108.10g
Describe social engineering and the risks associated

A

an attack which deceives people into performing actions or divulging information by preying on social norms, expectations, or other psychological tricks
human2human

51
Q

108.10h
Describe the rainbow table and the risks associated

A

precompiled table of hashes where a hacker can simply look up a hash to decrypt a password
these are extremely large

52
Q

108.10i
Describe denial of service (DoS) and the risks associated

A

interruption in an authorized user’s access by malicious intent

53
Q

108.10j
Describe distributed denial of service (DDoS) and the risks associated

A

DoS where multiple systems flood the bandwidth or resources of a targeted system

54
Q

108.11
Describe the functionality of PKI

A

Public Key Infrastructure
secures the electronic transfer of information by using a set of rules, policies, and procedures to manage digital certificates

55
Q

108.12
State the purpose of a Domain Controller, Exchange Server, and DNS

A

domain controller is the server which responds to security authentication requests
exchange server is a Microsoft email server which is usually joined to a trusted domain
DNS is authoritative to its single named IP space

56
Q

108.13a
Explain FTP and its specific port(s)

A

File Transfer Protocol
Ports 20/21

57
Q

108.13b
Explain SSH and its specific port(s)

A

Secure Shell
Port 22

58
Q

108.13c
Explain Telnet and its specific port(s)

A

Telecommunications Network
Port 23

59
Q

108.13d
Explain SMTP and its specific port(s)

A

Simple Mail Transfer Protocol
Port 25

60
Q

108.13e
Explain DNS and its specific port(s)

A

Domain Naming Service
Port 53

61
Q

108.13f
Explain DHCP and its specific port(s)

A

Dynamic Host Configuration Protocol
Ports 67/68

62
Q

108.13g
Explain HTTP/HTTPS and its specific port(s)

A

Hypertext Transfer Protocol
Port 80

Hypertext Transfer Protocol (Secure)
Port 443

63
Q

108.13h
Explain POP3 and its specific port(s)

A

Post Office Protocol
Port 110

64
Q

108.13i
Explain IMAP4 and its specific port(s)

A

Internet Message Access Protocol
Port 143

65
Q

108.14
Explain TCP and UPD internet protocols

A

Transmission Control Protocol
provides reliable connection over timely connection

User Datagram Protocol
provides timely connection over reliable connection

66
Q

108.15a
Define/discuss Mandatory Access Controls (MAC)

A

a system wide security policy which decrees who has access based on regulation at a central authority

67
Q

108.15b
Define/discuss Discretionary Access Controls (DAC)

A

an individual user can set a mechanism to allow or deny access

68
Q

108.15c
Define/discuss Role Based Access Controls (RBAC)

A

permissions needed to perform duties associated with a specific role or job

69
Q

108.15d
Define/discuss Separation of Duty

A

having more than one person required to complete a sensitive task to reduce the chance of conflict of interest, fraud, error, or abuse

70
Q

108.15e
Define/discuss least privilege

A

the principle of only allowing access to information and resources necessary to complete a task or job

71
Q

108.16
Define/discuss VOIP and VOSIP

A

Voice Over IP and Voice Over Secure IP
both are identical hardware/software that converts an analog signal into an IP datagram for transmission
VOSIP is when VOIP is used over a secured network

72
Q

108.17a
Define/discuss Network Address Translation (NAT)

A

remapping internal IP address space to another external IP while the traffic is in transit
3 Types:
one tone
one to many (PAT)
many to many

73
Q

108.17b
Define/discuss Port Address Translation (PAT)

A

“IP masquerading” and “NAT overload”
dynamic translation and tracking of outbound IP traffic
tracks port number and virtually reassigns all traffic making it seem like it came from the gateway instead then forwards that traffic to the intended host

74
Q

108.17c
Define/discuss demilitarized zone (DMZ)

A

a logical section of the network that is exposed (not protected by the local firewall) to allow services to an untrusted network

75
Q

108.17d
Define/discuss virtualization

A

the act of creating an emulated environment (not using the original hardware) to boost efficiency

76
Q

108.18
State the purpose of active directory

A

Microsoft’s implementation of security domains for centralized management purposes