1/41
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Network Security
Practices and technologies designed to protect the integrity, confidentiality, and availability of computer networks and data.
Demilitarized Zone (DMZ)
A separate network located outside the secure network perimeter, allowing untrusted outside users to access certain services without compromising the secure network.
Network Address Translation (NAT)
A technique that allows private IP addresses to be used on the public Internet by replacing them with public IP addresses.
Virtual LAN (VLAN)
A logical grouping of network devices that allows scattered users to be logically grouped together despite physical separation.
Firewall
A network security device that inspects and controls incoming and outgoing network traffic based on predetermined security rules.
Intrusion Detection System (IDS)
A system that monitors network traffic for suspicious activity and issues alerts when such activity is detected.
Intrusion Prevention System (IPS)
A network security device that monitors network traffic and takes action to block malicious activity.
Simple Network Management Protocol (SNMP)
A protocol used for managing devices on IP networks, allowing administrators to monitor, configure, and manage network devices.
Encryption
The process of converting information or data into a code to prevent unauthorized access.
Secure Copy Protocol (SCP)
A network protocol used to securely transfer files between hosts over a secure connection.
Host Intrusion Detection System (HIDS)
A software application designed to detect suspicious activity or policy violations on a single host or device.
Network Access Control (NAC)
A security technology that enforces policies on devices attempting to access a network, ensuring compliance before granting access.
Transport Layer Security (TLS)
A cryptographic protocol designed to provide secure communication over a computer network.
MAC Filtering
A security technique that restricts network access based on MAC addresses, typically implemented in network switches.
Packet Filtering
A method used by firewalls to control network traffic by examining each packet and allowing or blocking it based on predetermined rules.
SYN Flood Attack
A type of denial-of-service attack that overwhelms a target with TCP connection requests.
Spam Filter
A software application designed to detect unsolicited and unwanted email messages, commonly referred to as spam.
Load Balancer
A device or software that distributes network or application traffic across multiple servers to optimize resource use.
IP Telephony
The use of Internet Protocol technology to transmit voice communications over the Internet rather than the traditional public switched telephone network.
Cloud Computing
The delivery of computing services over the Internet, allowing users to access and store data on remote servers.
Packet Sniffer
A tool that captures and analyzes packets on a network, helpful in diagnosing network issues and monitoring traffic.
Active Directory (AD)
A directory service developed by Microsoft for Windows domain networks, providing a variety of network services.
___ is the process of converting information into a code to prevent unauthorized access.
Encryption
A ___ is a separate network located outside the secure network perimeter, allowing untrusted users access to certain services.
Demilitarized Zone (DMZ)
___ is a technique that allows private IP addresses to be used on the Internet by replacing them with public IP addresses.
Network Address Translation (NAT)
A ___ is a network security device that inspects and controls traffic based on predetermined security rules.
Firewall
___ is a system that monitors network traffic for suspicious activity and issues alerts.
Intrusion Detection System (IDS)
An ___ is a device that monitors and takes action to block malicious network activity.
Intrusion Prevention System (IPS)
___ is a protocol used for managing devices on IP networks, allowing administrators to monitor network devices.
Simple Network Management Protocol (SNMP)
The practice of restricting network access based on MAC addresses is known as ___.
MAC Filtering
A ___ attack overwhelms a target with TCP connection requests, causing denial of service.
SYN Flood Attack
___ is a software application designed to detect unsolicited and unwanted email messages.
Spam Filter
What is the purpose of a firewall?
To inspect and control incoming and outgoing network traffic based on predetermined security rules.
What does NAT stand for?
Network Address Translation.
Which protocol is used for secure file transfer?
Secure Copy Protocol (SCP).
What is the function of an Intrusion Prevention System (IPS)?
To monitor network traffic and block malicious activity.
What does SSL stand for in network security?
Secure Sockets Layer.
What is the role of a Load Balancer in networking?
To distribute network or application traffic across multiple servers to optimize resource use.
What kind of attacks does an Intrusion Detection System (IDS) protect against?
It protects against suspicious activity on the network and alerts administrators.
What is the primary function of Encryption?
To convert information or data into a code to prevent unauthorized access.
What type of network is a Demilitarized Zone (DMZ)?
A separate network located outside the secure network perimeter.
What distinguishes a Virtual LAN (VLAN)?
It allows scattered users to be logically grouped together despite physical separation.