NETWORKS Flashcards
Host/Client
Host: main computer; Other computers: Clients
Hub
Routes information to all computers regardless if it’s the recipient or not
Switch
Does essentially what a hub does, but more efficiently, by learning where particular addresses are on the network.
Router
A device that forwards data across computer networks. Connects networks. “Little computers dedicated to the task of routing network traffic”
Proxy Server
Acts as an intermediary for requests from clients seeking resources from other servers, ie internet
Firewall
A device configured to permit or deny applications upon a set of rules
VPN
Provides a secure tunnel connecting two hosts or networks
LAN
Covers a small physical office or home
WAN
Covers a broad area
MAN
Usually spans a city or large campus
GAN
Network composed of different interconnected computer networks and covers an unlimited geographical area
OSI Layers
Layer 1: Physical Layer 2: Data Link Layer 3: Network Layer 4: Transport Layer 5: Session Layer 6: Presentation Layer 7: Application
TCP/IP Layers
Layer 1: Network Interface
Layer 2: Internet
Layer 3: Transport
Layer 4: Application
What is the difference between IPv4 and IPv6
32bit and 128bit
SIPRNET
Secret Internet Protocol Router Network
NIPRNET
Non-classified Internet Protocol Router Network
JWICS
Joint Worldwide Intelligence Communications System
CSI
Cyber Security Inspection
DNS
Domain Name Server translates domain names to IP addresses
Virus
Software program designed to infect, destroy, modify, or cause other issues with your computer
Worm
Self-replicating virus that does not alter files, but resides in the active memory and duplicates itself
Trojan
A program that appears legitimate, but performs some illicit activity when it’s ran
Backdoor
Remote administration that, once installed on a computer, allows a user access and control of it over a network or the internet
Phishing
Criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card info by masquerading as a trustworthy entity in an e-mail