🔹108 NETWORKS Flashcards
🔹What is Network Topology?
It is the logical layout of the network (bus, ring, mesh, star)
🔹Mesh - Usually used to connect segments of a LAN
🔹HUB - is a common connection point for devices in a network
🔹Define the following acronyms.
LAN, WAN. MAN and GAN
🔹LAN- Local Area Network is a computer network covering a small physical area, like a home, office, or small group of buildings, such as a school, or an airport
🔹WAN- Wide Area Network is a computer network that covers a broad area (i.e., any network whose communications links cross metropolitan, regional, or national boundaries
MAN- Metropolitan Area Network
GAN- Global Area Network
🔹Define the following and how they are used.
NIPR, SIPR and JWICS
NIPR – unclass
🔹SIPR Net – Secret - SIPRNET is Secret Internet Protocol Router Network. Secret level networks that support the DOD community , Law enforcement agencies and homeland security
🔹JWICS – TS JWICS - Joint Worldwide Intelligence Communications System. A network established by Defense Intelligence Agency to connect all members of the DOD Intelligence Information Systems (DODIIS) community.
🔹Virus
Virus -
Infects another executable and uses a carrier program to spread itself.
🔹Worm
Worm -
Similar to a virus, but does not require a carrier program or user interaction to spread from host to host; self-propagates.
🔹Trojan
Trojan -
Malicious program disguised as something benign. Can allow a hacker access to a computer or be used as a Denial of Service attack.
🔹Backdoor
Backdoor -
Program that a hacker installs on a target system to allow access at a later time.
🔹Phishing
Phishing -
Social engineering attack involving email posing as a legitimate business or entity requesting seemingly necessary Personally Identifiable Information.
🔹What is the function of PKI
Provides encryption and data security in computer networks.
Public Key Infrastructure
- is a set of hardware, software, people, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates. In cryptography, a PKI is an arrangement that binds public keys with respective user identities by means of a certificate authority (CA). The user identity must be unique within each CA domain. The binding is established through the registration and issuance process, which, depending on the level of assurance the binding has, may be carried out by software at a CA, or under human supervision. The PKI role that assures this binding is called the Registration Authority (RA). For each user, the user identity, the public key, their binding, validity conditions and other attributes are made unforgeable in public key certificates issued by the CA.
🔹What is the use/purpose of a Firewall?
It is a hardware/software system designed to hide nodes from external networks.