• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/24

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

24 Cards in this Set

  • Front
  • Back

is a networking device that forwards data packets, directing traffic between computers on networks. "Layer 3 switch"



Router 

Router

a formatted unit of data carried by a packet-switched network.A is the unit of data that is routed between an origin and a destination on the Internet or any other______-switched network.

Network Packet

A bridge - is a computer networking device that connects devices together on a computer network.


Decides were traffic goes by using packet switching to receive, process, and forward data to the destination device

Network Switch

Network Switch

is a network device that has the ability to operate at higher layers of the OSI reference model. A multilayer switch can perform the functions of a switch as well as that of a router at incredibly fast speeds

Multi-layer switch

Multi-layer switch

is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

Firewall

Firewall

is a system that monitors a computer system on which it is installed to detect an intrusion and/or misuse, and responds by logging the activity and notifying the designated authority. A HIDS can be thought of as an agent that monitors and analyzes whether anything or anyone, whether internal or external, has circumvented the system’s security policy.

(HIDS) -Host-based intrusion detection system

is a device or software application that monitors a network or systems for malicious activity or policy violations.




Any detected activity or violation is typically reported either to an administrator or collected centrally using a security information and event management(SIEM) system

Intrusion Detection System (IDS)

Intrusion Detection System (IDS)

is a network security/threat prevention technology that examines network traffic flows to detect and prevent vulnerability exploits.




Itsits directly behind the firewall and provides a complementary layer of analysis that negatively selects for dangerous content.

Intrusion Prevention System(IPS)

a device that creates a wireless local area network, or WLAN, usually in an office or large building.


An ______ connects to a wired router, switch, or hub via an Ethernet cable, and projects a Wi-Fi signal to a designated area.

Access Point(wireless/wired)

It is the use of a program to screen and exclude from access or availability Web pages or e-mail that is deemed objectionable.




------------- is used by corporations as part of Internet firewall computers and also by home computer owners, especially by parents to screen the content their children have access to from a computer.

Content Filter

is a device that acts as a reverse proxy and distributes network or application traffic across a number of. servers. Load balancers are used to increase capacity (concurrent users) and reliability of applications.

load Balancer 

load Balancer

is the most basic networking device that connects multiple computers or other network devices together. Unlike a network switch or router, a network_____has no routing tables or intelligence on where to send information and broadcasts all network data across each connection.

Hub

Hub

A device that converts the computer's digital pulses to tones that can be carried over analog telephone lines, and vice versa.




Prior to the turn of the century, analog modems used to be standard equipment on most desktop and all laptop computers.

Analog Modem

Analog Modem

a computer network traffic management technique which delays some or all datagrams to bring them into compliance with the desired traffic profile.




https://youtu.be/k_8_c33HDs0

Traffic Shaping (Packet Shaping)

is a type of networking device that provides secure creation of VPN connections and delivery of messages between VPN nodes.




It is a type of router device, built specifically for creating and managing VPN communication infrastructures.

VPN Concentrator

VPN Concentrator

is a server (a computer system or an application) that acts as an intermediary for requests from clients seeking resources from other servers.




A client connects to the___ server, requesting some service, such as a file, connection, web page, or other resources available from a different server.

Proxies

Proxies

it provides protection against a multitude of threats without adding to your device-management burden. Here's how to choose the right model for your organization

All in one security appliance 

All in one security appliance

allows you to control access to Internet websites by permitting or denying access to specific websites based on information contained in an URL list.

url filtering

involves examining data in order to identify regular expressions or patterns that are indicative of sensitive data (such as patterns used in social security and credit card numbers) as well as keywords that indicate sensitivity (such as “confidential”).

Content Inspection

filter web content and files being downloaded/uploaded to the Internet for malicious software.

Malware Inspection

is a firewall that monitors, filters or blocks data packets as they travel to and from a Web application.




It can be either network-based, host-based or cloud-based and is often deployed through a proxy and placed in front of one or more Web applications. Running as a network appliance, server plug-in or cloud service, the___ inspects each packet and uses a rule base to analyze Layer 7 web application logic and filter out potentially harmful traffic.

WAF- Web application firewall

is a program that is used to detect unsolicited and unwanted email and prevent those messages from getting to a user's inbox.

Spam Filter

Devices that look at, analyze going over the network, examining, protocol decode, looking at what is associated with it, how the application is working as it communicates with the network

application aware devices

Behavior-based

Signature-based


Anomaly-based


Heuristic

UTM Security-appliances