108 Networks Flashcards

1
Q

Define Host/Client

A

Main computer that’s connected to other computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define Application Server

A

Runs only specific applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define Hub

A

Common connection point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a switch?

A

Common connection point but smarter. Only forwards packets to intended recipient port.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define Router

A

Joins multiple wired or wireless networks together

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define WAP

A

WAP: Wireless Access Protocol; Open international standard for application-layer network communications in a wireless communication environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a Proxy Server?

A

Controls client access to the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a Firewall?

A

Blocks unauthorized access while permitting authorized communications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a VPN?

A

VPN: Virtual Private Network; Built for creating remote access VPNs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define Back-up

A

Making copies of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define Repeater

A

Regenerate incoming electrical, wireless, or optical signals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define the following layers of routing and common devices associated with each:

  • Access
  • Distribution
  • Core
A
  • Access: Routers located at customer sites
  • Distribution: Aggregate traffic from multiple access routers to a major enterprise location
  • Core: Provide a collapsed backbone interconnecting distribution tier routers from multiple buildings of a campus or large enterprise locations
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Topology?

A

Topology: System Architecture (4 types)

  • Bus: Set of clients are connected via a shared communication line
  • Star: All devices are connected to a central hub
  • Ring: Network in which each node connects to exactly two other nodes, forming a ring
  • Mesh: Network in which all components are connected to every component
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Define LAN

A

LAN: Local Area Network; Computer network covering a small physical area (home, office)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Define WAN

A

WAN: Wide Area Network; Network covering broad area (i.e. NSA NET/NMCI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Define MAN

A

MAN: Metropolitan Area Network; Large computer network (college campus)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Define GAN

A

GAN: Global Area Network; Composed of different interconnected computer networks and covers an unlimited geographical area (internet/Google)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are the layers of the OSI model?

A

OSI Model (7 layers):

  • Application
  • Presentation
  • Network
  • Session
  • Data link
  • Transport
  • Physical
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are the layers of the TCP/IP Model?

A

TCP/IP Model (4 layers):

  • Application
  • Transport
  • Internet
  • Network interface
20
Q

State the difference between IPv4 and IPv6

A

IPv6 has a vastly larger address space than IPv4.

  • IPv6 uses 128-bit address
  • IPv4 uses 32 bits
21
Q

Define NIPRNET and how it is used

A

NIPRNET: Non-secure Internet Protocol Router Network.

- Unclassified network. DoD owned and created by DISA

22
Q

Define SIPRNET and how it is used

A

SIPRNET: Secure Internet Protocol Router Network.
- Secret level network. Supports DoD, Law enforcement, Dept. of Homeland Security, deployed to every embassy & military command

23
Q

Define JWICS and how it is used

A

JWICS: Joint Worldwide Intelligence Communications System

- Connects all members of DoD intelligence IS community; Operates TS/SI/TK/US only level of SCI portion of DISN

24
Q

Explain DoDN GIG and how it is employed

A

DoDN GIG: Dept. of Defense Network; Global Information Grid

25
Q

Explain DISN and how it is employed

A

DISN: Defense Information System Network

26
Q

Explain NMCI and how it is employed

A

NMCI: Navy/Marine Corps Intranet; deployed throughout the Navy and Marine Corps. Interoperable with ONENET (CONUS/Shore stations)

27
Q

Explain ONENET

A

Navy-wide initiative to install a common and secure IT infrastructure to OCONUS Navy locations

28
Q

Explain IT21

A

IT21: For afloat units. Interoperable with ONENET

29
Q

What is machine language?

A

Machine language generally consists of strings of numbers (ultimately reduced to 1s and 0s) that instruct computers to perform their most elementary operations at a time

30
Q

What is assembly language?

A

Assembly language is low level programming language using the human readable instructions of CPU (Step by Step instructions for people)

31
Q

What is High-Level Language?

A

Enables a programmer to write programs that are more or less independent of a particular computer

32
Q

What is an Operating System?

A

Responsible for management & coordination of activities and sharing of resources of computers. Acts as a host for computing applications run on machines.

33
Q

What is an Application?

A

Program designed to perform specific functions directly for the user.

34
Q

Describe a Virus and the risks associated

A

Designed to infect, destroy, modify, or cause other problems

35
Q

Describe a Worm and the risks associated

A

Self-replicating virus

36
Q

Describe a Trojan and the risks associated

A

Appears legitimate, but performs some illicit activity when run

37
Q

Describe Backdoor and the risks associated

A

Remote admin utility that allows a user access and control it over a network

38
Q

Describe a Phishing and the risks associated

A

Illegal process of attempting to acquire sensitive information

39
Q

What is the function of Network Enumeration and the risk associated?

A

Computing activity in which user names, and information on groups, shares and services of networked computers are retrieved to later exploit

40
Q

What is the function of Buffer Overflow and the risk associated?

A

Anomaly where a process stores data in buffer outside the memory the programmer set aside for it

41
Q

What is the function of SQL Injection and the risk associated?

A

Malicious code is inserted into strings

42
Q

What is the function of Dictionary Attack and the risk associated?

A

Method of breaking into a password -protected computer by entering every word in dictionary

43
Q

What is the function of Privilege Escalation and the risk associated?

A

Act of exploiting a bug or design flaw to gain access to resources

44
Q

What is the function of Brute Force Attack and the risk associated?

A

Used to break an encryption by trying all possibilities

45
Q

What is the function of Social Engineering and the risk associated?

A

Tricking a user into giving access to sensitive information

46
Q

Describe the functionality of PKI

A

An arrangement that bings public keys with respective user identities by means of a certificate authority (CA). User ID must be unique within each CA domain

47
Q

State the purpose of DNS

A

Translates domain names into the numerical identifiers associated with networking