1/57
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Technique to distribute workloads across multiple servers to prevent overload, improve resource utilization, and increase fault tolerance.
Configuration where all load balancers simultaneously handle network traffic, distributing workload evenly.
Configuration with a primary active load balancer and a secondary passive balancer ready to take over if the primary fails.
Method ensuring that user requests remain connected to the same server throughout a session.
Method of distributing each new user request sequentially across available servers.
Modified round-robin method accounting for varying server capacities or loads.
Single IP address representing multiple systems behind a load balancer, hiding the actual IP addresses.
Ensuring subsequent requests from a user are directed to the same server to maintain continuity.
Dividing a network into multiple segments to limit traffic flow, enhance security, and improve management.
Logical segmentation of a physical network, allowing separate networks to exist on shared hardware.
Technique for spanning VLANs across multiple switches, enabling extended VLAN functionality.
Isolated network segment between the public internet and private internal networks, designed as a secure zone for externally facing servers.
Systems specifically secured to minimize vulnerabilities and reduce the attack surface.
Network traffic flowing horizontally between servers and systems within the same data center or network segment.
Network traffic flowing vertically into and out of a data center, typically between internal and external networks.
Semiprivate network using common internet technologies to share resources securely with external partners.
Private internal network using common internet technologies to provide resources within an organization.
Intermediate server handling requests from internal users to external resources, enhancing security by filtering traffic.
Proxy server acting on behalf of the client, typically used to enforce security and filtering policies for outbound traffic.
Server-side proxy intercepting incoming requests, providing load balancing, traffic filtering, and SSL offloading.
Security strategy assuming no implicit trust and verifying each request before granting access.
Secure encrypted tunnel allowing private communications over public networks.
VPN configuration that automatically establishes and maintains a secure connection whenever internet connectivity is detected.
VPN method routing only specified traffic through the secure tunnel, while other traffic accesses the internet directly.
VPN method routing all traffic through the secure VPN connection, enhancing security but possibly impacting performance.
Securely connects individual remote users to an internal network from remote locations.
Secure connection linking two geographically separate networks through an encrypted tunnel.
Protocol suite providing secure communication through authentication, integrity, confidentiality, and anti-replay at the network layer.
IPSec mode encrypting only the data payload of packets, leaving headers visible for routing.
IPSec mode encrypting entire IP packets, including headers, providing maximum security.
VPN utilizing Secure Sockets Layer/Transport Layer Security to encrypt communication between web browsers and servers.
Browser-based secure remote access solution leveraging HTML5, eliminating the need for additional plugins.
VPN protocol used to create encrypted tunnels, often combined with IPSec for enhanced security.
Security methodology enforcing access policies based on device security posture and user credentials.
NAC solution deploying software agents on connecting devices to verify compliance.
NAC solution where compliance checks occur without persistent agents, typically using network-based assessments.
Separate communication channel for managing network devices independently of regular network data channels.
Network security method restricting access based on allowed MAC addresses.
Manually assigning specific MAC addresses to ports.
Allowing switches to learn MAC addresses dynamically upon connection.
Dynamically learning and retaining MAC address information persistently across reboots.
Protection mechanism managing and mitigating flooding attacks by monitoring and limiting network traffic rates.
Security feature preventing unauthorized BPDU packets to protect Spanning Tree Protocol configurations.
Techniques like Spanning Tree Protocol (STP) to prevent network loops at layer 2 of OSI model.
Security measure preventing rogue DHCP servers from providing malicious configuration data to clients.
Allowing or denying network access based on permitted MAC addresses, primarily used on switches and wireless networks.
Hardened server providing controlled access to secure zones of a network.
System analyzing network traffic to detect suspicious activities and intrusions.
System analyzing and actively blocking suspicious network traffic.
Intrusion detection method using known patterns of malicious activity.
Intrusion detection method identifying deviations from normal network behavior, typically using artificial intelligence.
Intrusion detection method identifying traffic deviating from established normal patterns.
Intrusion prevention system directly inspecting and potentially blocking traffic in real-time.
Intrusion detection system monitoring network traffic passively without interfering directly.
Hardware device managing cryptographic keys and operations securely, often used for sensitive transactions.
Device capturing network or system data to detect and report anomalies or malicious activities.
Device combining inputs from multiple sources into a single output channel, optimizing network efficiency.
Security device enforcing network security policies by filtering inbound and outbound traffic based on predetermined rules.