Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
18 Cards in this Set
- Front
- Back
NAT |
Network Address Translation Hides internal hosts from the public network, uses an IP proxy, displays one IP address to the internet |
|
VLAN |
Virtual Local Area Network |
|
NAC |
Network Access Control Makes security checks of users or actual connections made before sessions are initiated |
|
PaaS |
Platform as a Service A cloud computing service, offering software, OS, and on demand computing |
|
SaaS |
Software as a Service Web based applications, webmail |
|
IaaS |
Infrastructure as a Service Networking and storage |
|
PEAP |
Protected Extensible Authentication Protocol - related to wireless authentication |
|
WPA2 |
WiFi Protected Access 2 - most secure protocol for wireless networks |
|
SLA |
Service License Agreement |
|
ICMP |
Something |
|
NAS |
Something |
|
RPO |
Recovery point objective - defines acceptable data loss |
|
MTTR |
mean time to repair |
|
MTBF |
mean time between failure - average number of failures per million hours |
|
ACL |
Access control lists can be used to control the traffic that is allowed in or out of a network. They are usually included as part of a firewall, and they specifically will control the traffic. |
|
OUs |
Organizational Units |
|
MAC |
Mandatory access control (MAC) is strictest type of access control model that has permissions set by the system and uses security labels for object permissions. It is a well-defined model used primarily by the government. |
|
SDLC |
System development life cycle |