108: Networks Flashcards

1
Q

108.1a
Define Host/Client

A

architecture that allows multiple users to connect and share resources on the same server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

108.1b
Define application server

A

a server that is designed for running specific applications for individual clients to keep resources available for other tasks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

108.1c
Define hub

A

central connection point for network connections that receives a packet at one port and copies it unmodified to all other ports (OSI layer 1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

108.1d
Define switch

A

central connection point for network connections that receives a packet at one port, filters it based on the MAC address, and forwards it to the intended destination (OSI layer 2)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

108.1e
Define router

A

a networking device that forwards packets between networks by determining the best path to the destination; work at the network layer (OSI layer 3)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

108.1f
Define WAP

A

wireless access point
physical wireless device for accessing the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

108.1g
Define proxy server

A

a server that acts as an intermediary for requests from clients seeking resources from other users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

108.1h
Define firewall

A

a network component placed to help eliminate undesired access; 1st line of defense for the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

108.1i
Define VPN concentrator

A

broadcast point for hidden IPs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

108.1j
Define backup

A

making data copies that can be restored after a data loss event

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

108.1k
Define repeater

A

device that receives a signal, cleans it of unnecessary noise, regenerates it, and retransmits it at a higher power level (OSI layer 1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

108.2a
Define the access layer of routing

A

located at customer sites such as branch offices that don’t need hierarchical routing of their own

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

108.2b
Define the distribution layer of routing

A

aggregate traffic from multiple access routers either at the same site or to collect the data and send it to a major enterprise location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

108.2c
Define the core layer of routing

A

provide a “collapsible backbone” interconnecting distribution tier routers from multiple buildings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

108.3a
Explain topology

A

the physical arrangement of an area network’s components
- bus: common backbone to connect all devices
- star: features a central connection point
- ring: every device has exactly two neighbors
- mesh: all nodes are connected to each other

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

108.3b
Explain LAN

A

local area network
privately owned network(s) within a single building or campus of up to a few kilometers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

108.3c
Explain WAN

A

wide area network
publicly owned group of networks over a large geographical area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

108.3d
Explain MAN

A

metropolitan area network
slightly larger than LAN; covers a group of buildings or city and can be publicly or privately owned

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

108.3e
Explain GAN

A

global area network
used to support mobile communications across a number of wireless LANs, satellite coverage areas, etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

108.3f
Explain VLAN

A

virtual local area network
enables devices from multiple networks to be combined to a single logical network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

108.4a
Identify the functions, by layer, of the OSI Model

A

(picture bottom up)
7. Application Layer - app2app comms
6. Presentation Layer - data rep and encryption
5. Session Layer - interhost comms
4. Transport Layer - end2end connections
3. Network Layer - path determination and IP addressing
2. Data Link Layer - physical addressing (MAC & LLC)
1. Physical Layer - media, signal and binary transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

108.4b
Identify the functions, by layer, of the TCP/IP Model

A

(picture bottom up)
4. Application Layer - Telnet, FTP, SMTP
3. Transport Layer - TCP, UDP
2. Internet Layer - IP
1. Network Access Layer - Ethernet, Token ring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

108.5
State the difference between IPv4 and IPv6

A

IPv4 utilizes 32 bits for addressing
IPv6 utilizes 128 bits for addressing (allowing for more possible address combinations)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

108.6a
Define NIPRNET and how its used

A

Nonclassified Internet Protocol Router Network
used to exchange sensitive but unclassified information between internal users as well as provide internet access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
108.6b Define SIPRNET and how its used
Secret Internet Protocol Router Network interconnected computer networks used to transmit classified information via the TCP/IP protocol suite
26
108.6c Define JWICS and how its used
Joint Worldwide Intelligence Communications Systems interconnected computer networks used to transmit classified information via packet switching over TCP/IP
27
108.6d Define CENTRIXS and how its used
Combined Enterprise Regional Information Exchange System used to connect with select allied countries transmits classified information via a secure TCP/IP infrastructure
28
108.7a Explain CANES and where its employed
Consolidated Afloat Network Enterprise Services newest network architecture/system in the fleet consolidates 4 legacy afloat networks
29
108.7b Explain DoDIN (GIG) and where its employed
DoD Information Network (formerly Global Information Grid) globally connected, end2end set of information capabilities for managing information on demand
30
108.7c Explain DISN and where its employed
Defense Information System Network DoD's worldwide enterprise level telecommunications infrastructure providing end2end information transfer
31
108.7d Explain NMCI and where its employed
Navy/Marine Corps Intranet developed to procure and manage IT for the Navy at the enterprise level partnership between the Navy and the industry
32
108.7e Explain ONENET and where its employed
Navy-wide initiative to install a common and secure IT infrastructure to OCONUS navy locations based on NMCI infrastructure architecture and designed to be interoperable
33
108.7f Explain IT21/ISNS and where its employed
IT21: secret version of CANES idependently administered but centrally governed by the CNO ISNS: Integrated Shipboard Network System legacy predecessor to CANES
34
108.8a Describe Machine Language
the natural language of a computer, defined by its hardware design consists of strings of numbers (1s and 0s)
35
108.8b Describe Assembly Language
English-like abbreviations used by programmers that represent elementary operations
36
108.8c Describe High-Level Language
programming languages such as C, C++, and Java
37
108.8d Describe Operating System
software that controls a computer and provides an interface for the user
38
108.8e Describe Application
computer software designed to perform a singular task or multiple related tasks
39
108.9a Describe a virus and the risks associated
malicious code written with the intention to damage the computer can attach to other files or boot sectors
40
108.9b Describe a worm and the risks associated
self-replicating malware uses a computer network to send copies of itself to other nodes does not need to attach itself to an existing program
41
108.9c Describe a trojan and the risks associated
malware that appears to perform a desirable function but instead facilitates unauthorized access to the computer system
42
108.9d Describe a backdoor and the risks associated
a gap in the security of a computer intentionally left open to permit continuous access without restrictions hackers may do this after a system is compromised
43
108.9e Describe phishing and the risks associated
type of social engineering where users are baited into giving up sensitive information
44
108.10a Describe network enumeration and the risks associated
discovery of hosts and devices on a network in an effort to further identify the function of the remote host, solicit information, and identify the host's vulnerabilities
45
108.10b Describe buffer overflow and the risks associated
attack on a system where a program writing to memory buffer exceeds the bounds of memory control causes erratic program behavior, computer crashes, DoS, etc
46
108.10c Describe SQL injection and the risks associated
attack on a system where malicious code is attempted to be run by exploiting an incorrectly filter input statement malicious code is injected and executed at the same time
47
108.10d Describe a dictionary attack and the risks associated
repeatedly and systematically feeding a system keys and passcodes that are likely to be valid this is not a brute force attack
48
108.10e Describe privilege escalation and the risks associated
a user gaining access to resources they would not normally be granted
49
108.10f Describe brute force attack and the risks associated
feeding a system all possible passphrases, checking every possible combination of characters
50
108.10g Describe social engineering and the risks associated
an attack which deceives people into performing actions or divulging information by preying on social norms, expectations, or other psychological tricks human2human
51
108.10h Describe the rainbow table and the risks associated
precompiled table of hashes where a hacker can simply look up a hash to decrypt a password these are extremely large
52
108.10i Describe denial of service (DoS) and the risks associated
interruption in an authorized user's access by malicious intent
53
108.10j Describe distributed denial of service (DDoS) and the risks associated
DoS where multiple systems flood the bandwidth or resources of a targeted system
54
108.11 Describe the functionality of PKI
Public Key Infrastructure secures the electronic transfer of information by using a set of rules, policies, and procedures to manage digital certificates
55
108.12 State the purpose of a Domain Controller, Exchange Server, and DNS
domain controller is the server which responds to security authentication requests exchange server is a Microsoft email server which is usually joined to a trusted domain DNS is authoritative to its single named IP space
56
108.13a Explain FTP and its specific port(s)
File Transfer Protocol Ports 20/21
57
108.13b Explain SSH and its specific port(s)
Secure Shell Port 22
58
108.13c Explain Telnet and its specific port(s)
Telecommunications Network Port 23
59
108.13d Explain SMTP and its specific port(s)
Simple Mail Transfer Protocol Port 25
60
108.13e Explain DNS and its specific port(s)
Domain Naming Service Port 53
61
108.13f Explain DHCP and its specific port(s)
Dynamic Host Configuration Protocol Ports 67/68
62
108.13g Explain HTTP/HTTPS and its specific port(s)
Hypertext Transfer Protocol Port 80 Hypertext Transfer Protocol (Secure) Port 443
63
108.13h Explain POP3 and its specific port(s)
Post Office Protocol Port 110
64
108.13i Explain IMAP4 and its specific port(s)
Internet Message Access Protocol Port 143
65
108.14 Explain TCP and UPD internet protocols
Transmission Control Protocol provides reliable connection over timely connection User Datagram Protocol provides timely connection over reliable connection
66
108.15a Define/discuss Mandatory Access Controls (MAC)
a system wide security policy which decrees who has access based on regulation at a central authority
67
108.15b Define/discuss Discretionary Access Controls (DAC)
an individual user can set a mechanism to allow or deny access
68
108.15c Define/discuss Role Based Access Controls (RBAC)
permissions needed to perform duties associated with a specific role or job
69
108.15d Define/discuss Separation of Duty
having more than one person required to complete a sensitive task to reduce the chance of conflict of interest, fraud, error, or abuse
70
108.15e Define/discuss least privilege
the principle of only allowing access to information and resources necessary to complete a task or job
71
108.16 Define/discuss VOIP and VOSIP
Voice Over IP and Voice Over Secure IP both are identical hardware/software that converts an analog signal into an IP datagram for transmission VOSIP is when VOIP is used over a secured network
72
108.17a Define/discuss Network Address Translation (NAT)
remapping internal IP address space to another external IP while the traffic is in transit 3 Types: one tone one to many (PAT) many to many
73
108.17b Define/discuss Port Address Translation (PAT)
"IP masquerading" and "NAT overload" dynamic translation and tracking of outbound IP traffic tracks port number and virtually reassigns all traffic making it seem like it came from the gateway instead then forwards that traffic to the intended host
74
108.17c Define/discuss demilitarized zone (DMZ)
a logical section of the network that is exposed (not protected by the local firewall) to allow services to an untrusted network
75
108.17d Define/discuss virtualization
the act of creating an emulated environment (not using the original hardware) to boost efficiency
76
108.18 State the purpose of active directory
Microsoft's implementation of security domains for centralized management purposes