NETWORKS Flashcards

1
Q

Host/Client

A

Host: main computer; Other computers: Clients

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Hub

A

Routes information to all computers regardless if it’s the recipient or not

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Switch

A

Does essentially what a hub does, but more efficiently, by learning where particular addresses are on the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Router

A

A device that forwards data across computer networks. Connects networks. “Little computers dedicated to the task of routing network traffic”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Proxy Server

A

Acts as an intermediary for requests from clients seeking resources from other servers, ie internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Firewall

A

A device configured to permit or deny applications upon a set of rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

VPN

A

Provides a secure tunnel connecting two hosts or networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

LAN

A

Covers a small physical office or home

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

WAN

A

Covers a broad area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

MAN

A

Usually spans a city or large campus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

GAN

A

Network composed of different interconnected computer networks and covers an unlimited geographical area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

OSI Layers

A
Layer 1: Physical 
Layer 2: Data Link
Layer 3: Network
Layer 4: Transport
Layer 5: Session
Layer 6: Presentation
Layer 7: Application
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

TCP/IP Layers

A

Layer 1: Network Interface
Layer 2: Internet
Layer 3: Transport
Layer 4: Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the difference between IPv4 and IPv6

A

32bit and 128bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

SIPRNET

A

Secret Internet Protocol Router Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

NIPRNET

A

Non-classified Internet Protocol Router Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

JWICS

A

Joint Worldwide Intelligence Communications System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

CSI

A

Cyber Security Inspection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

DNS

A

Domain Name Server translates domain names to IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Virus

A

Software program designed to infect, destroy, modify, or cause other issues with your computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Worm

A

Self-replicating virus that does not alter files, but resides in the active memory and duplicates itself

22
Q

Trojan

A

A program that appears legitimate, but performs some illicit activity when it’s ran

23
Q

Backdoor

A

Remote administration that, once installed on a computer, allows a user access and control of it over a network or the internet

24
Q

Phishing

A

Criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card info by masquerading as a trustworthy entity in an e-mail

25
Q

Network enumeration

A

A computing activity in which usernames and info on groups, shares and services of networked computers are retrieved

26
Q

Buffer Overflow

A

An anomaly where a process stores data in a buffer outside the memory the programmer set aside for it

27
Q

SQL Injection

A

An attack in which malicious code is inserted into strings that are later passed to an instance of SQL server for parsing and execution

28
Q

Dictionary Attack

A

Method of breaking into a password-protected computer or server by systematically entering every word in a dictionary as a password

29
Q

Privilege Escalation

A

Act of exploiting a bug or design flaw in a software application to gain access to resources which normally would have been protected from an application or user

30
Q

Brute Force Attack

A

Technique used to break an encryption or authentication system by trying all possibilities

31
Q

Social Engineering

A

Practice of tricking a user into giving, or giving access to, sensitive information thereby bypassing most or all protection

32
Q

Network Topologies

A

Star, Mesh, Bus, Ring

33
Q

What kind of topology does CANES use

A

MESH

34
Q

SECREL

A

Secret Releasable

35
Q

Enclaves of SECREL

A

4: Japan, Korea, CMFP, CMFC

36
Q

DHCP

A

Dynamic Host Control Protocol

37
Q

Data Centers; How Many?

A

4 Data Centers NIPR/ 6 Data Centers SIPR

38
Q

Location of Primary Data Centers on NIPR

A

ADP

39
Q

Location of Primary Data Centers on SIPR

A

DBS

40
Q

What is Microsoft Exchange

A

Email Service

41
Q

What does PKI stand for

A

Public Key Infrastructure

42
Q

NTCSS Applications

A

RADM, RSUPPLY, OMMS-NG, NALCOMIS

43
Q

CANES

A

Consolidated Afloat Network and Enterprise Service

44
Q

Why is Screaming Eagle set

A

Degraded Bandwidth

45
Q

Why is River City set

A

It is situational

46
Q

What is affected when River City is set

A

Internet and email

47
Q

GCCS-M

A

Global Command and Control Systems Maritime

48
Q
Ports: 
20
21
22
23
25
53
80
443
A
20 [FTP]
21 [FTP]
22 [SSH]
23 [TELNET]
25 [DNS]
53 [SMTP]
80 [HTTP]
443 [HTTPS]
49
Q

How many octets are in an IP Address?

A

4

50
Q

7 layers of OSI

A
1- Physical
2- Data Link
3- Network
4- Transport 
5- Session
6- Presentation
7- Application
51
Q

TCP/IP Model

A

Application, Transport, Internet, Network Access