NETWORKS Flashcards

1
Q

Host/Client

A

Host: main computer; Other computers: Clients

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Hub

A

Routes information to all computers regardless if it’s the recipient or not

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Switch

A

Does essentially what a hub does, but more efficiently, by learning where particular addresses are on the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Router

A

A device that forwards data across computer networks. Connects networks. “Little computers dedicated to the task of routing network traffic”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Proxy Server

A

Acts as an intermediary for requests from clients seeking resources from other servers, ie internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Firewall

A

A device configured to permit or deny applications upon a set of rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

VPN

A

Provides a secure tunnel connecting two hosts or networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

LAN

A

Covers a small physical office or home

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

WAN

A

Covers a broad area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

MAN

A

Usually spans a city or large campus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

GAN

A

Network composed of different interconnected computer networks and covers an unlimited geographical area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

OSI Layers

A
Layer 1: Physical 
Layer 2: Data Link
Layer 3: Network
Layer 4: Transport
Layer 5: Session
Layer 6: Presentation
Layer 7: Application
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

TCP/IP Layers

A

Layer 1: Network Interface
Layer 2: Internet
Layer 3: Transport
Layer 4: Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the difference between IPv4 and IPv6

A

32bit and 128bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

SIPRNET

A

Secret Internet Protocol Router Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

NIPRNET

A

Non-classified Internet Protocol Router Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

JWICS

A

Joint Worldwide Intelligence Communications System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

CSI

A

Cyber Security Inspection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

DNS

A

Domain Name Server translates domain names to IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Virus

A

Software program designed to infect, destroy, modify, or cause other issues with your computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Worm

A

Self-replicating virus that does not alter files, but resides in the active memory and duplicates itself

22
Q

Trojan

A

A program that appears legitimate, but performs some illicit activity when it’s ran

23
Q

Backdoor

A

Remote administration that, once installed on a computer, allows a user access and control of it over a network or the internet

24
Q

Phishing

A

Criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card info by masquerading as a trustworthy entity in an e-mail

25
Network enumeration
A computing activity in which usernames and info on groups, shares and services of networked computers are retrieved
26
Buffer Overflow
An anomaly where a process stores data in a buffer outside the memory the programmer set aside for it
27
SQL Injection
An attack in which malicious code is inserted into strings that are later passed to an instance of SQL server for parsing and execution
28
Dictionary Attack
Method of breaking into a password-protected computer or server by systematically entering every word in a dictionary as a password
29
Privilege Escalation
Act of exploiting a bug or design flaw in a software application to gain access to resources which normally would have been protected from an application or user
30
Brute Force Attack
Technique used to break an encryption or authentication system by trying all possibilities
31
Social Engineering
Practice of tricking a user into giving, or giving access to, sensitive information thereby bypassing most or all protection
32
Network Topologies
Star, Mesh, Bus, Ring
33
What kind of topology does CANES use
MESH
34
SECREL
Secret Releasable
35
Enclaves of SECREL
4: Japan, Korea, CMFP, CMFC
36
DHCP
Dynamic Host Control Protocol
37
Data Centers; How Many?
4 Data Centers NIPR/ 6 Data Centers SIPR
38
Location of Primary Data Centers on NIPR
ADP
39
Location of Primary Data Centers on SIPR
DBS
40
What is Microsoft Exchange
Email Service
41
What does PKI stand for
Public Key Infrastructure
42
NTCSS Applications
RADM, RSUPPLY, OMMS-NG, NALCOMIS
43
CANES
Consolidated Afloat Network and Enterprise Service
44
Why is Screaming Eagle set
Degraded Bandwidth
45
Why is River City set
It is situational
46
What is affected when River City is set
Internet and email
47
GCCS-M
Global Command and Control Systems Maritime
48
``` Ports: 20 21 22 23 25 53 80 443 ```
``` 20 [FTP] 21 [FTP] 22 [SSH] 23 [TELNET] 25 [DNS] 53 [SMTP] 80 [HTTP] 443 [HTTPS] ```
49
How many octets are in an IP Address?
4
50
7 layers of OSI
``` 1- Physical 2- Data Link 3- Network 4- Transport 5- Session 6- Presentation 7- Application ```
51
TCP/IP Model
Application, Transport, Internet, Network Access