How can we help?

You can also find more resources in our Help Center.

Section Charlie EIDWS Training(108 Networks)

STUDY
PLAY
Define the following device and it's uses: Host/Client
Host- a computer connected to the Internet or another IP-based network.
Define the following device and it's uses: application server
application server is a software framework that provides an environment where applications can run, no matter what the applications are or what they do.
Define the following device and it's uses: Hub
a device for connecting multiple twisted pair or fiber optic Ethernet devices together and making them act as a single network segment.
Define the following device and it's uses: Switch
Switch- an electrical component that can break an electrical circuit, interrupting the current or diverting it from one conductor to another.
Define the following device and it's uses: Router
A router is a device that forwards data packets across computer networks. Routers perform the data "traffic direction" functions on the Internet. A router is a microprocessor-controlled device that is connected to two or more data lines from different networks.
Define the following device and it's uses: WAP
Wireless Application Protocol.
Define the following device and it's uses: Proxy Server
a proxy server is a server (a computer system or an application) that acts as an intermediary for requests from clients seeking resources from other servers. A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resource, available from a different server.
Define the following device and it's uses:
a device or set of devices designed to permit or deny network transmissions based upon a set of rules and is frequently used to protect networks from unauthorized access while permitting legitimate communications to pass.
Define the following device and it's uses: VPN Concentrator
incorporate the most advanced encryption and authentication techniques available.
Define the following device and it's uses: Back-Up
the process of backing up refers to making copies of data so that these additional copies may be used to restore the original after a data loss event.
Define the following device and it's uses: Repeater
An electronic device that receives a signal and retransmits it at a higher level and/or higher power, or onto the other side of an obstruction, so that the signal can cover longer distances.
Define the following layers of routing and common devices associated with each:
a. Access
b. Distribution
c. Core
...
Explain the following network terminology: Topology(Bus/Star/Ring/Mesh)
the layout pattern of interconnections of the various elements (links, nodes, etc.) of a computer network.
Explain the following network terminology: LAN
Local Area Network - a computer network that connects computers and devices in a limited geographical area such as home, school, computer laboratory or office building
Explain the following network terminology: WAN
Wide Area Network - a computer network that covers a broad area.
Explain the following network terminology: MAN
Metropolitan Area Network - a computer network that usually spans a city or a large campus.
Explain the following network terminology: GAN
Global Area Network - enable worldwide deployment of multi-vendor interoperable mobile broadband wireless access networks.
Identify the functions, by layer, of the following models:
a. OSI Model
b. TCP/IP Model
...
State the difference between IPv4 and IPv6.
...
Define the following and how they are used:
a. NIPRNET
b. SIPRNET
c. JWICS
a. Unclassified
b. Secret
c. Top Secret
Explain the following networks and where they are employed: DoDN(GIG)
Global Information Grid
Explain the following networks and where they are employed: DISN
Defense Information System Network
Explain the following networks and where they are employed: NMCI
Navy/Marine Corps Intranet
Explain the following networks and where they are employed: ONENET
an open-source standard for wireless networking
Explain the following networks and where they are employed: IT21
Information Technology for the 21st century
Describe the following: Machine Language
a system of instructions and data executed directly by a computer's central processing unit.
Describe the following: Assembly Language
a low-level programming language for computers, microprocessors, microcontrollers, and other programmable devices.
Describe the following: High-Level Language
a programming language with strong abstraction from the details of the computer.
Describe the following: Operating System
software, consisting of programs and data, that runs on computers and manages computer hardware resources and provides common services for efficient execution of various application software.
Describe the following: Application
computer software designed to help the user to perform singular or multiple related specific tasks.
Describe the following to include the risks associated: Virus
a computer program that can copy itself[1] and infect a computer.
Describe the following to include the risks associated: Worm
a self-replicating malware computer program, which uses a computer network to send copies of itself to other nodes (computers on the network) and it may do so without any user intervention.
Describe the following to include the risks associated: Trojan
software that appears to perform a desirable function for the user prior to run or install, but (perhaps in addition to the expected function) steals information or harms the system.
Describe the following to include the risks associated: Backdoor
a method of bypassing normal authentication, securing remote access to a computer, obtaining access to plaintext, and so on, while attempting to remain undetected.
Describe the following to include the risks associated: Phishing
a way of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication.
Describe function and risk associated with following activities: Network Enumeration
a computing activity in which user names, and info on groups, shares and services of networked computers are retrieved.
Describe function and risk associated with following activities: Buffer Overflow
an anomaly where a program, while writing data to a buffer, overruns the buffer's boundary and overwrites adjacent memory.
Describe function and risk associated with following activities: SQL Injection
a code injection technique that exploits a security vulnerability occurring in the database layer of an application.
Describe function and risk associated with following activities: Dictionary Attack
a technique for defeating a cipher or authentication mechanism by trying to determine its decryption key or passphrase by searching likely possibilities.
Describe function and risk associated with following activities: Privilege Escalation
the act of exploiting a bug, design flaw or configuration oversight in an operating system or software application to gain elevated access to resources that are normally protected from an application or user.
Describe function and risk associated with following activities: Brute Force Attack
or exhaustive key search is a strategy that can in theory be used against any encrypted data[1] by an attacker who is unable to take advantage of any weakness in an encryption system that would otherwise make his/her task easier.
Describe function and risk associated with following activities: Social Engineering
the act of manipulating people into performing actions or divulging confidential information, rather than by breaking in or using technical cracking techniques.
Describe the functionality of PKI
a set of hardware, software, people, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates.
State the purpose of DNS.
hierarchical naming system built on a distributed database for computers, services, or any resource connected to the Internet or a private network.