108 Networks Flashcards
WAP
Wireless Access Point
Allows devices to connect to a network without using physical connections
types of networks
LAN
WAN
MAN
GAN
LAN
local area network
comms network interconnection a variety of data within a small physical area
WAN
Wide Area Network
connects computers using long distance telecommunication systems
covers broad areas
MAN
Metropolitan Are Network
Covers a gourd of nearby corporate offices or a city
GAN
Global Area Network
Covers an unlimited geographical area
Length of bit addresses for IPV 4
32 bits
Length of bit addressing for IPV 6
128 bits
SIPRNET
Secret Internet Protocol Router Network
NIPRNET
Non Classified internet protocol router network
JWICS
Joint Worldwide Intelligence Communications System
ONENET
navy wide initiative to install a common IT infrastructure to OCONUS navy locations
DoDN
DoDN Global Information Grid
Summation of all military networks
DNS
Domain Naming System
internet server that helps point domain names or the host name to their associated IP address
IT 21
Like NMCI and ONENET but for afloat commands
NMCI
Navy Marine Corps internet
Creates one network throughout CONUS locations
OSI Model
Open Standards Interconnection Model
“please do not throw sausage pizza away”
Physical
data Link
Network
Transport
Session
Presentation
Application
DISN
Defense Information Systems network
Satisfies DoD long haul and WAN transfer comms request
Back Up
A copy of important data kept from retrieval
Application Server
Server side software that hosts and runs applications
Host Client
Main computer connected to other computers
Switch
Smarter version of a hub/ does not broadcast out on all ports
Hub
common connection point for devices with a network hub / within a network
wireless access protocol
Wireless access protocol
Allows wireless devises to access internet services over a cellular network or WI-FI
Firewall
A combination of hardware and software that protects a network from attack by hackers
router
A device that connects two networks and allows packets to be transmitted and received between them
VPN concentrator
Hardware devise specifically engineered to protect Virtual Private Networks
High Level Language
advanced computer programming language that isn’t limited by the type of comport or for one specific job and is easily understood
Assembly language
a low level programming language used to interface with computer hardware
Machine Language
collection of binary digits or bits that the computer reads and interprets
Application
any software or tool that uses a network to perform its tasks
Network
responsible for logical addressing and translating logical addresses into physical addresses
Uses routers
Virus
Program intended to damage a computer system
Worm
A program similar to a virus, but it propagates itself over a network
Trojan
Any application that pretends to be one thing in order to get past to do something malicious
backdoor
an opening left in an program application that allows additional access to data
phishing
Asking someone for information you need by making seem like a legitimate request
buffer overflow
error that occurs when incoming data rate exceeds acceptance capacity of a system
dictionary attack
an attack that uses words from a database to test different passwords until a match is found
Privilege escalation
The result when a user obtains access to a resource they normally would not have access to
Brute Force Attack
A type of attack that relies purely on trial and error
Social engineering
An attack that uses others by willingly saying information
SQL injection
attack used to exploit vulnerability by injecting malicious code and having host systems run it
Bus topology
Every computer is connected by the same backbone network that runs from one end to the other
Star topology
All networks connected at one central point so they can all communicate as if they were directly connected
Ring topology
Each network is only connected to the two others on either side
Mesh topology
every computer is directly connected to every other computer
CORE
layer of routing used as a collapsed backbone- tier routers from multiple buildings
Access routers
located at customer sites that do not deed hierarchical routing of their own
distribution routers
aggregate traffic from multiple access routers, either from the same site, or connects multiple sites to a large enterprise location
Proxy server
gateway between you and the internet
repeaters
device placed on a network which repeats a signal to decrease or eliminate fading
operating systems
software program that enables the computer hardware to communicate and operate with the computer software