108 Networks Flashcards

1
Q

Host/Client

A

Host- a computer connected to a computer network or the internet
Client- a application or system that accesses a remote service on another computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Application Server

A

computer which houses the application programs to ‘serve’ them to client computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Hub

A

a hardware device that is used to network multiple computers together

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Switch

A

hardware device used to network multiple computers together

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Router

A

a hardware device that routes data from a LAN to another network connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

WAP

A

Wireless Access Point- a device, such as a wireless router, that allows wireless devices to connect to a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Proxy Server

A

a server that all computers on the local network have to go through before accessing information on the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Firewall

A

can be either hardware or software based. limit the data that can pass through it and protects a networked server or client machine from damage by unauthorized users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

VPN Concentrator

A

Used to create encrypted tunnels between hosts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Back-up

A

the process of backing up refers to making copies of data so that these additional copies may be used to restore the original after a data loss event

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Repeater

A

a wireless repeater is a device used to increase the effective coverage of our wireless network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Layers of routing

A

Access- desktop layer
Distribution- LAN-based and layer 3 switches
Core- core of the network, backbone, high-end switches and high-speed cables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Topology

A

interconnection of the various elements of a computer network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

LAN

A

computer network covering a small physical area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

WAN

A

computer group that covers a broad area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

MAN

A

large computer network that usually spans a city or large campus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

GAN

A

network used for supporting mobile communications across an arbitrary number of wireless LANs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

OSI Model

A

Physical-signal transmission
Data Link-delivery and receipt of data
Network-routing packets across the network
Transport- end-to-end transport of data
Session- communications sessions between machines
Presentation- preparing the data for different interfaces
Application- supports application and end-user processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

TCP/IP Model

A

Network Access Layer- physically sent
Internet Layer- packages data into IP datagrams
Transport Layer- comms session management between host computers
Application Layer-how host protocols interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

IPV4

A

connectionless protocol - 32 bits

21
Q

IPV6

A

vastly larger address space than IPV4 -128 bits

22
Q

NIPRNET

A

used for processing information up to Unclassified

23
Q

SIPRNET

A

used for processing information up to Secret

24
Q

JWICS

A

used for processing information up to SCI

25
Q

DoDN (GIG)

A

all encompassing communications project of the US DoD

26
Q

DISN

A

DOD consolidated worldwide enterprise level telecommunications infrastructure that provides end-to-end info transfer

27
Q

NMCI

A

primary network for continental US users

28
Q

ONE-NET

A

common and secure infrastructure to OCONUS Navy locations

29
Q

IT21

A

serves as primary network for afloat commands

30
Q

Machine Language

A

lowest-level programming language

31
Q

Assembly Language

A

programmers use either high-level programming language or assembly language

32
Q

High-Level Language

A

programming language with strong abstraction from the details of the computer

33
Q

Operating System

A

software consisting of programs and data that runs on computers

34
Q

Application

A

Computer Software designed to help the user perform singular or multiple related specific tasks

35
Q

Virus

A

can only spread from one computer to another

36
Q

Worm

A

self-replicating computer program

37
Q

Trojan

A

malware that appears to perform a desirable function for the user prior to run or install, but instead, facilities unauthorized access of the users computer system

38
Q

Backdoor

A

method of bypassing normal authentication

39
Q

Phishing

A

criminally fraudulent process of attempting to acquire sensitive info such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communications

40
Q

Network Enumeration

A

discovering as much as possible about the target, identifying al potential avenues of attack, and attempting to compromise a network

41
Q

Buffer Overflow

A

occurs when a program or process tries to store more data in a buffer than it was intended to hold

42
Q

SQL Injection

A

type of security exploit in which the attacker adds SQL code o a Web for input box to gain access to resources or make changes to data

43
Q

Dictionary Attack

A

defeating cipher or authentication mechanism by trying to determine its decryption key or paraphrase by looking in the dictionary

44
Q

Privilege Escalation

A

act of exploiting a bug or design flaw in software app to gain access to resources that would normally be protected from an app or user

45
Q

Brute Force Attack

A

used to break encryption of data

46
Q

Social Engineering

A

act of manipulating people into performing actions or divulging confidential information

47
Q

Public Key Infrastructure (PKI)

A

a framework for creating a secure method for exchanging information based on public key cryptography

48
Q

Purpose of DNS

A

Domain Name Service- translated internet domain and host names to IP addresses