Section Charlie EIDWS Training(108 Networks)

44 terms by watchsectioncharlie 

Create a new folder

Advertisement Upgrade to remove ads

Define the following device and it's uses: Host/Client

Host- a computer connected to the Internet or another IP-based network.

Define the following device and it's uses: application server

application server is a software framework that provides an environment where applications can run, no matter what the applications are or what they do.

Define the following device and it's uses: Hub

a device for connecting multiple twisted pair or fiber optic Ethernet devices together and making them act as a single network segment.

Define the following device and it's uses: Switch

Switch- an electrical component that can break an electrical circuit, interrupting the current or diverting it from one conductor to another.

Define the following device and it's uses: Router

A router is a device that forwards data packets across computer networks. Routers perform the data "traffic direction" functions on the Internet. A router is a microprocessor-controlled device that is connected to two or more data lines from different networks.

Define the following device and it's uses: WAP

Wireless Application Protocol.

Define the following device and it's uses: Proxy Server

a proxy server is a server (a computer system or an application) that acts as an intermediary for requests from clients seeking resources from other servers. A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resource, available from a different server.

Define the following device and it's uses:

a device or set of devices designed to permit or deny network transmissions based upon a set of rules and is frequently used to protect networks from unauthorized access while permitting legitimate communications to pass.

Define the following device and it's uses: VPN Concentrator

incorporate the most advanced encryption and authentication techniques available.

Define the following device and it's uses: Back-Up

the process of backing up refers to making copies of data so that these additional copies may be used to restore the original after a data loss event.

Define the following device and it's uses: Repeater

An electronic device that receives a signal and retransmits it at a higher level and/or higher power, or onto the other side of an obstruction, so that the signal can cover longer distances.

Define the following layers of routing and common devices associated with each:
a. Access
b. Distribution
c. Core

...

Explain the following network terminology: Topology(Bus/Star/Ring/Mesh)

the layout pattern of interconnections of the various elements (links, nodes, etc.) of a computer network.

Explain the following network terminology: LAN

Local Area Network - a computer network that connects computers and devices in a limited geographical area such as home, school, computer laboratory or office building

Explain the following network terminology: WAN

Wide Area Network - a computer network that covers a broad area.

Explain the following network terminology: MAN

Metropolitan Area Network - a computer network that usually spans a city or a large campus.

Explain the following network terminology: GAN

Global Area Network - enable worldwide deployment of multi-vendor interoperable mobile broadband wireless access networks.

Identify the functions, by layer, of the following models:
a. OSI Model
b. TCP/IP Model

...

State the difference between IPv4 and IPv6.

...

Define the following and how they are used:
a. NIPRNET
b. SIPRNET
c. JWICS

a. Unclassified
b. Secret
c. Top Secret

Explain the following networks and where they are employed: DoDN(GIG)

Global Information Grid

Explain the following networks and where they are employed: DISN

Defense Information System Network

Explain the following networks and where they are employed: NMCI

Navy/Marine Corps Intranet

Explain the following networks and where they are employed: ONENET

an open-source standard for wireless networking

Explain the following networks and where they are employed: IT21

Information Technology for the 21st century

Describe the following: Machine Language

a system of instructions and data executed directly by a computer's central processing unit.

Describe the following: Assembly Language

a low-level programming language for computers, microprocessors, microcontrollers, and other programmable devices.

Describe the following: High-Level Language

a programming language with strong abstraction from the details of the computer.

Describe the following: Operating System

software, consisting of programs and data, that runs on computers and manages computer hardware resources and provides common services for efficient execution of various application software.

Describe the following: Application

computer software designed to help the user to perform singular or multiple related specific tasks.

Describe the following to include the risks associated: Virus

a computer program that can copy itself[1] and infect a computer.

Describe the following to include the risks associated: Worm

a self-replicating malware computer program, which uses a computer network to send copies of itself to other nodes (computers on the network) and it may do so without any user intervention.

Describe the following to include the risks associated: Trojan

software that appears to perform a desirable function for the user prior to run or install, but (perhaps in addition to the expected function) steals information or harms the system.

Describe the following to include the risks associated: Backdoor

a method of bypassing normal authentication, securing remote access to a computer, obtaining access to plaintext, and so on, while attempting to remain undetected.

Describe the following to include the risks associated: Phishing

a way of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication.

Describe function and risk associated with following activities: Network Enumeration

a computing activity in which user names, and info on groups, shares and services of networked computers are retrieved.

Describe function and risk associated with following activities: Buffer Overflow

an anomaly where a program, while writing data to a buffer, overruns the buffer's boundary and overwrites adjacent memory.

Describe function and risk associated with following activities: SQL Injection

a code injection technique that exploits a security vulnerability occurring in the database layer of an application.

Describe function and risk associated with following activities: Dictionary Attack

a technique for defeating a cipher or authentication mechanism by trying to determine its decryption key or passphrase by searching likely possibilities.

Describe function and risk associated with following activities: Privilege Escalation

the act of exploiting a bug, design flaw or configuration oversight in an operating system or software application to gain elevated access to resources that are normally protected from an application or user.

Describe function and risk associated with following activities: Brute Force Attack

or exhaustive key search is a strategy that can in theory be used against any encrypted data[1] by an attacker who is unable to take advantage of any weakness in an encryption system that would otherwise make his/her task easier.

Describe function and risk associated with following activities: Social Engineering

the act of manipulating people into performing actions or divulging confidential information, rather than by breaking in or using technical cracking techniques.

Describe the functionality of PKI

a set of hardware, software, people, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates.

State the purpose of DNS.

hierarchical naming system built on a distributed database for computers, services, or any resource connected to the Internet or a private network.

Please allow access to your computer’s microphone to use Voice Recording.

Having trouble? Click here for help.

We can’t access your microphone!

Click the icon above to update your browser permissions above and try again

Example:

Reload the page to try again!

Reload

Press Cmd-0 to reset your zoom

Press Ctrl-0 to reset your zoom

It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.

Please upgrade Flash or install Chrome
to use Voice Recording.

For more help, see our troubleshooting page.

Your microphone is muted

For help fixing this issue, see this FAQ.

Star this term

You can study starred terms together

NEW! Voice Recording

Create Set