Chapter 8: Network Services, Virtualization, and Cloud Computing Flashcards
A/An ____ is a network separated from the internal network by a firewall but also protected from the Internet by a firewall.
screened subnet
____ works as a client-server model, where the clients generate messages based on the triggering of certain conditions, such as a login or an error with a device, and send them to a centralized logging server. Microsoft operating systems don’t natively support it.
syslog
In information security, there’s a framework for access control known as triple A (AAA) which stands for ____.
Authentication, Authorization, and Accounting
A/An ____ is an Internet appliance, most likely a software installation or virtual appliance, that block malicious emails from entering a network.
spam gateway
____ centralizes security management, allowing administrators to manage all their security-related hardware and software through a single device or interface. It is generally implemented as a stand-alone device (or series of devices) and replaces the traditional firewall.
UTM or Unified Threat Management
____ systems are high-level management systems that are used to control manufacturing machines and processes; manage large-scale infrastructure settings, such as power grids, oil and gas pipelines, and water treatment facilities; and run components in buildings, such as heating and air conditioning.
SCADA or Supervisory Control and Data Acquisition
A/An ____ is a temporary, isolated desktop environment. Any app in it will act as it would in a full version of the chosen OS, but files are not saved to the hard drive or memory.
sandbox
In ____, the cloud provider supplies the network infrastructure.
IaaS or Infrastructure as a Service
In ____, the cloud provider supplies the network infrastructure, the software development tools, and platforms.
PaaS or Platform as a Service
In ____, the cloud provider supplies the infrastructure and applications.
SaaS or Software as a Service