108 Networks Flashcards
Define Host/Client
Main computer that’s connected to other computers
Define Application Server
Runs only specific applications
Define Hub
Common connection point
What is a switch?
Common connection point but smarter. Only forwards packets to intended recipient port.
Define Router
Joins multiple wired or wireless networks together
Define WAP
WAP: Wireless Access Protocol; Open international standard for application-layer network communications in a wireless communication environment
What is a Proxy Server?
Controls client access to the internet
What is a Firewall?
Blocks unauthorized access while permitting authorized communications
What is a VPN?
VPN: Virtual Private Network; Built for creating remote access VPNs
Define Back-up
Making copies of data
Define Repeater
Regenerate incoming electrical, wireless, or optical signals
Define the following layers of routing and common devices associated with each:
- Access
- Distribution
- Core
- Access: Routers located at customer sites
- Distribution: Aggregate traffic from multiple access routers to a major enterprise location
- Core: Provide a collapsed backbone interconnecting distribution tier routers from multiple buildings of a campus or large enterprise locations
What is Topology?
Topology: System Architecture (4 types)
- Bus: Set of clients are connected via a shared communication line
- Star: All devices are connected to a central hub
- Ring: Network in which each node connects to exactly two other nodes, forming a ring
- Mesh: Network in which all components are connected to every component
Define LAN
LAN: Local Area Network; Computer network covering a small physical area (home, office)
Define WAN
WAN: Wide Area Network; Network covering broad area (i.e. NSA NET/NMCI)
Define MAN
MAN: Metropolitan Area Network; Large computer network (college campus)
Define GAN
GAN: Global Area Network; Composed of different interconnected computer networks and covers an unlimited geographical area (internet/Google)
What are the layers of the OSI model?
OSI Model (7 layers):
- Application
- Presentation
- Network
- Session
- Data link
- Transport
- Physical
What are the layers of the TCP/IP Model?
TCP/IP Model (4 layers):
- Application
- Transport
- Internet
- Network interface
State the difference between IPv4 and IPv6
IPv6 has a vastly larger address space than IPv4.
- IPv6 uses 128-bit address
- IPv4 uses 32 bits
Define NIPRNET and how it is used
NIPRNET: Non-secure Internet Protocol Router Network.
- Unclassified network. DoD owned and created by DISA
Define SIPRNET and how it is used
SIPRNET: Secure Internet Protocol Router Network.
- Secret level network. Supports DoD, Law enforcement, Dept. of Homeland Security, deployed to every embassy & military command
Define JWICS and how it is used
JWICS: Joint Worldwide Intelligence Communications System
- Connects all members of DoD intelligence IS community; Operates TS/SI/TK/US only level of SCI portion of DISN
Explain DoDN GIG and how it is employed
DoDN GIG: Dept. of Defense Network; Global Information Grid
Explain DISN and how it is employed
DISN: Defense Information System Network
Explain NMCI and how it is employed
NMCI: Navy/Marine Corps Intranet; deployed throughout the Navy and Marine Corps. Interoperable with ONENET (CONUS/Shore stations)
Explain ONENET
Navy-wide initiative to install a common and secure IT infrastructure to OCONUS Navy locations
Explain IT21
IT21: For afloat units. Interoperable with ONENET
What is machine language?
Machine language generally consists of strings of numbers (ultimately reduced to 1s and 0s) that instruct computers to perform their most elementary operations at a time
What is assembly language?
Assembly language is low level programming language using the human readable instructions of CPU (Step by Step instructions for people)
What is High-Level Language?
Enables a programmer to write programs that are more or less independent of a particular computer
What is an Operating System?
Responsible for management & coordination of activities and sharing of resources of computers. Acts as a host for computing applications run on machines.
What is an Application?
Program designed to perform specific functions directly for the user.
Describe a Virus and the risks associated
Designed to infect, destroy, modify, or cause other problems
Describe a Worm and the risks associated
Self-replicating virus
Describe a Trojan and the risks associated
Appears legitimate, but performs some illicit activity when run
Describe Backdoor and the risks associated
Remote admin utility that allows a user access and control it over a network
Describe a Phishing and the risks associated
Illegal process of attempting to acquire sensitive information
What is the function of Network Enumeration and the risk associated?
Computing activity in which user names, and information on groups, shares and services of networked computers are retrieved to later exploit
What is the function of Buffer Overflow and the risk associated?
Anomaly where a process stores data in buffer outside the memory the programmer set aside for it
What is the function of SQL Injection and the risk associated?
Malicious code is inserted into strings
What is the function of Dictionary Attack and the risk associated?
Method of breaking into a password -protected computer by entering every word in dictionary
What is the function of Privilege Escalation and the risk associated?
Act of exploiting a bug or design flaw to gain access to resources
What is the function of Brute Force Attack and the risk associated?
Used to break an encryption by trying all possibilities
What is the function of Social Engineering and the risk associated?
Tricking a user into giving access to sensitive information
Describe the functionality of PKI
An arrangement that bings public keys with respective user identities by means of a certificate authority (CA). User ID must be unique within each CA domain
State the purpose of DNS
Translates domain names into the numerical identifiers associated with networking