108: Networks Flashcards
108.1a
Define Host/Client
architecture that allows multiple users to connect and share resources on the same server
108.1b
Define application server
a server that is designed for running specific applications for individual clients to keep resources available for other tasks
108.1c
Define hub
central connection point for network connections that receives a packet at one port and copies it unmodified to all other ports (OSI layer 1)
108.1d
Define switch
central connection point for network connections that receives a packet at one port, filters it based on the MAC address, and forwards it to the intended destination (OSI layer 2)
108.1e
Define router
a networking device that forwards packets between networks by determining the best path to the destination; work at the network layer (OSI layer 3)
108.1f
Define WAP
wireless access point
physical wireless device for accessing the internet
108.1g
Define proxy server
a server that acts as an intermediary for requests from clients seeking resources from other users
108.1h
Define firewall
a network component placed to help eliminate undesired access; 1st line of defense for the network
108.1i
Define VPN concentrator
broadcast point for hidden IPs
108.1j
Define backup
making data copies that can be restored after a data loss event
108.1k
Define repeater
device that receives a signal, cleans it of unnecessary noise, regenerates it, and retransmits it at a higher power level (OSI layer 1)
108.2a
Define the access layer of routing
located at customer sites such as branch offices that don’t need hierarchical routing of their own
108.2b
Define the distribution layer of routing
aggregate traffic from multiple access routers either at the same site or to collect the data and send it to a major enterprise location
108.2c
Define the core layer of routing
provide a “collapsible backbone” interconnecting distribution tier routers from multiple buildings
108.3a
Explain topology
the physical arrangement of an area network’s components
- bus: common backbone to connect all devices
- star: features a central connection point
- ring: every device has exactly two neighbors
- mesh: all nodes are connected to each other
108.3b
Explain LAN
local area network
privately owned network(s) within a single building or campus of up to a few kilometers
108.3c
Explain WAN
wide area network
publicly owned group of networks over a large geographical area
108.3d
Explain MAN
metropolitan area network
slightly larger than LAN; covers a group of buildings or city and can be publicly or privately owned
108.3e
Explain GAN
global area network
used to support mobile communications across a number of wireless LANs, satellite coverage areas, etc
108.3f
Explain VLAN
virtual local area network
enables devices from multiple networks to be combined to a single logical network
108.4a
Identify the functions, by layer, of the OSI Model
(picture bottom up)
7. Application Layer - app2app comms
6. Presentation Layer - data rep and encryption
5. Session Layer - interhost comms
4. Transport Layer - end2end connections
3. Network Layer - path determination and IP addressing
2. Data Link Layer - physical addressing (MAC & LLC)
1. Physical Layer - media, signal and binary transmission
108.4b
Identify the functions, by layer, of the TCP/IP Model
(picture bottom up)
4. Application Layer - Telnet, FTP, SMTP
3. Transport Layer - TCP, UDP
2. Internet Layer - IP
1. Network Access Layer - Ethernet, Token ring
108.5
State the difference between IPv4 and IPv6
IPv4 utilizes 32 bits for addressing
IPv6 utilizes 128 bits for addressing (allowing for more possible address combinations)
108.6a
Define NIPRNET and how its used
Nonclassified Internet Protocol Router Network
used to exchange sensitive but unclassified information between internal users as well as provide internet access
108.6b
Define SIPRNET and how its used
Secret Internet Protocol Router Network
interconnected computer networks used to transmit classified information via the TCP/IP protocol suite
108.6c
Define JWICS and how its used
Joint Worldwide Intelligence Communications Systems
interconnected computer networks used to transmit classified information via packet switching over TCP/IP
108.6d
Define CENTRIXS and how its used
Combined Enterprise Regional Information Exchange System
used to connect with select allied countries
transmits classified information via a secure TCP/IP infrastructure
108.7a
Explain CANES and where its employed
Consolidated Afloat Network Enterprise Services
newest network architecture/system in the fleet
consolidates 4 legacy afloat networks
108.7b
Explain DoDIN (GIG) and where its employed
DoD Information Network (formerly Global Information Grid)
globally connected, end2end set of information capabilities for managing information on demand
108.7c
Explain DISN and where its employed
Defense Information System Network
DoD’s worldwide enterprise level telecommunications infrastructure providing end2end information transfer
108.7d
Explain NMCI and where its employed
Navy/Marine Corps Intranet
developed to procure and manage IT for the Navy at the enterprise level
partnership between the Navy and the industry
108.7e
Explain ONENET and where its employed
Navy-wide initiative to install a common and secure IT infrastructure to OCONUS navy locations
based on NMCI infrastructure architecture and designed to be interoperable
108.7f
Explain IT21/ISNS and where its employed
IT21:
secret version of CANES
idependently administered but centrally governed by the CNO
ISNS:
Integrated Shipboard Network System
legacy predecessor to CANES
108.8a
Describe Machine Language
the natural language of a computer, defined by its hardware design
consists of strings of numbers (1s and 0s)
108.8b
Describe Assembly Language
English-like abbreviations used by programmers that represent elementary operations
108.8c
Describe High-Level Language
programming languages such as C, C++, and Java
108.8d
Describe Operating System
software that controls a computer and provides an interface for the user
108.8e
Describe Application
computer software designed to perform a singular task or multiple related tasks
108.9a
Describe a virus and the risks associated
malicious code written with the intention to damage the computer
can attach to other files or boot sectors
108.9b
Describe a worm and the risks associated
self-replicating malware
uses a computer network to send copies of itself to other nodes
does not need to attach itself to an existing program
108.9c
Describe a trojan and the risks associated
malware that appears to perform a desirable function but instead facilitates unauthorized access to the computer system
108.9d
Describe a backdoor and the risks associated
a gap in the security of a computer intentionally left open to permit continuous access without restrictions
hackers may do this after a system is compromised
108.9e
Describe phishing and the risks associated
type of social engineering where users are baited into giving up sensitive information
108.10a
Describe network enumeration and the risks associated
discovery of hosts and devices on a network in an effort to further identify the function of the remote host, solicit information, and identify the host’s vulnerabilities
108.10b
Describe buffer overflow and the risks associated
attack on a system where a program writing to memory buffer exceeds the bounds of memory control
causes erratic program behavior, computer crashes, DoS, etc
108.10c
Describe SQL injection and the risks associated
attack on a system where malicious code is attempted to be run by exploiting an incorrectly filter input statement
malicious code is injected and executed at the same time
108.10d
Describe a dictionary attack and the risks associated
repeatedly and systematically feeding a system keys and passcodes that are likely to be valid
this is not a brute force attack
108.10e
Describe privilege escalation and the risks associated
a user gaining access to resources they would not normally be granted
108.10f
Describe brute force attack and the risks associated
feeding a system all possible passphrases, checking every possible combination of characters
108.10g
Describe social engineering and the risks associated
an attack which deceives people into performing actions or divulging information by preying on social norms, expectations, or other psychological tricks
human2human
108.10h
Describe the rainbow table and the risks associated
precompiled table of hashes where a hacker can simply look up a hash to decrypt a password
these are extremely large
108.10i
Describe denial of service (DoS) and the risks associated
interruption in an authorized user’s access by malicious intent
108.10j
Describe distributed denial of service (DDoS) and the risks associated
DoS where multiple systems flood the bandwidth or resources of a targeted system
108.11
Describe the functionality of PKI
Public Key Infrastructure
secures the electronic transfer of information by using a set of rules, policies, and procedures to manage digital certificates
108.12
State the purpose of a Domain Controller, Exchange Server, and DNS
domain controller is the server which responds to security authentication requests
exchange server is a Microsoft email server which is usually joined to a trusted domain
DNS is authoritative to its single named IP space
108.13a
Explain FTP and its specific port(s)
File Transfer Protocol
Ports 20/21
108.13b
Explain SSH and its specific port(s)
Secure Shell
Port 22
108.13c
Explain Telnet and its specific port(s)
Telecommunications Network
Port 23
108.13d
Explain SMTP and its specific port(s)
Simple Mail Transfer Protocol
Port 25
108.13e
Explain DNS and its specific port(s)
Domain Naming Service
Port 53
108.13f
Explain DHCP and its specific port(s)
Dynamic Host Configuration Protocol
Ports 67/68
108.13g
Explain HTTP/HTTPS and its specific port(s)
Hypertext Transfer Protocol
Port 80
Hypertext Transfer Protocol (Secure)
Port 443
108.13h
Explain POP3 and its specific port(s)
Post Office Protocol
Port 110
108.13i
Explain IMAP4 and its specific port(s)
Internet Message Access Protocol
Port 143
108.14
Explain TCP and UPD internet protocols
Transmission Control Protocol
provides reliable connection over timely connection
User Datagram Protocol
provides timely connection over reliable connection
108.15a
Define/discuss Mandatory Access Controls (MAC)
a system wide security policy which decrees who has access based on regulation at a central authority
108.15b
Define/discuss Discretionary Access Controls (DAC)
an individual user can set a mechanism to allow or deny access
108.15c
Define/discuss Role Based Access Controls (RBAC)
permissions needed to perform duties associated with a specific role or job
108.15d
Define/discuss Separation of Duty
having more than one person required to complete a sensitive task to reduce the chance of conflict of interest, fraud, error, or abuse
108.15e
Define/discuss least privilege
the principle of only allowing access to information and resources necessary to complete a task or job
108.16
Define/discuss VOIP and VOSIP
Voice Over IP and Voice Over Secure IP
both are identical hardware/software that converts an analog signal into an IP datagram for transmission
VOSIP is when VOIP is used over a secured network
108.17a
Define/discuss Network Address Translation (NAT)
remapping internal IP address space to another external IP while the traffic is in transit
3 Types:
one tone
one to many (PAT)
many to many
108.17b
Define/discuss Port Address Translation (PAT)
“IP masquerading” and “NAT overload”
dynamic translation and tracking of outbound IP traffic
tracks port number and virtually reassigns all traffic making it seem like it came from the gateway instead then forwards that traffic to the intended host
108.17c
Define/discuss demilitarized zone (DMZ)
a logical section of the network that is exposed (not protected by the local firewall) to allow services to an untrusted network
108.17d
Define/discuss virtualization
the act of creating an emulated environment (not using the original hardware) to boost efficiency
108.18
State the purpose of active directory
Microsoft’s implementation of security domains for centralized management purposes