🔹108 NETWORKS Flashcards

1
Q

🔹What is Network Topology?

A

It is the logical layout of the network (bus, ring, mesh, star)

🔹Mesh - Usually used to connect segments of a LAN

🔹HUB - is a common connection point for devices in a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

🔹Define the following acronyms.

LAN, WAN. MAN and GAN

A

🔹LAN- Local Area Network is a computer network covering a small physical area, like a home, office, or small group of buildings, such as a school, or an airport

🔹WAN- Wide Area Network is a computer network that covers a broad area (i.e., any network whose communications links cross metropolitan, regional, or national boundaries

MAN- Metropolitan Area Network

GAN- Global Area Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

🔹Define the following and how they are used.

NIPR, SIPR and JWICS

A

NIPR – unclass

🔹SIPR Net – Secret - SIPRNET is Secret Internet Protocol Router Network. Secret level networks that support the DOD community , Law enforcement agencies and homeland security

🔹JWICS – TS JWICS - Joint Worldwide Intelligence Communications System. A network established by Defense Intelligence Agency to connect all members of the DOD Intelligence Information Systems (DODIIS) community.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

🔹Virus

A

Virus -

Infects another executable and uses a carrier program to spread itself.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

🔹Worm

A

Worm -

Similar to a virus, but does not require a carrier program or user interaction to spread from host to host; self-propagates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

🔹Trojan

A

Trojan -

Malicious program disguised as something benign. Can allow a hacker access to a computer or be used as a Denial of Service attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

🔹Backdoor

A

Backdoor -

Program that a hacker installs on a target system to allow access at a later time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

🔹Phishing

A

Phishing -

Social engineering attack involving email posing as a legitimate business or entity requesting seemingly necessary Personally Identifiable Information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

🔹What is the function of PKI

A

Provides encryption and data security in computer networks.

Public Key Infrastructure

  • is a set of hardware, software, people, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates. In cryptography, a PKI is an arrangement that binds public keys with respective user identities by means of a certificate authority (CA). The user identity must be unique within each CA domain. The binding is established through the registration and issuance process, which, depending on the level of assurance the binding has, may be carried out by software at a CA, or under human supervision. The PKI role that assures this binding is called the Registration Authority (RA). For each user, the user identity, the public key, their binding, validity conditions and other attributes are made unforgeable in public key certificates issued by the CA.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

🔹What is the use/purpose of a Firewall?

A

It is a hardware/software system designed to hide nodes from external networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly