Compare Internet and Embedded Appliances Flashcards

Lesson 6B

1
Q

it’s a technology that allows multiple devices within a private network to share a single public IP address when accessing the internet, a router acts as a translator, converting private IP addresses to a public one before sending data out to the internet and vice versa when receiving data back.

A

Network Address Translation (NAT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

It takes a whole HTTP request from a client, checks it, then forwards it to the destination server on the Internet. When the reply comes back, it checks it and then shuttles it back to the LAN computer. port (often 8080 by convention)

A

proxy server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

are programmed with scripts that can identify
known malicious traffic patterns. It can raise an alert when a match is made. An intrusion prevention system (IPS) can additionally take some action to
block the source of the malicious packets.

A

Intrusion detection systems (IDS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

allow or block traffic based on a network access control list specifying source and destination IP addresses and application ports.

A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

solutions scan files being transferred over the network to detect any matches for known malware signatures in binary data.

A

Antivirus/antimalware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

use SPF, DKIM, and DMARC to verify the authenticity of mail servers and are configured with filters that can identify spoofed, misleading, malicious, or otherwise unwanted messages. Filltered in server prior to mailbox.

A

Spam gateways

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

are used to block outgoing access to unauthorized websites and
services.

A

Content filters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

scan outgoing traffic for information that is marked as confidential or personal.

A

Data leak/loss prevention (DLP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

is one that enforces a variety of security policies and controls, combining the work of multiple security functions.

A

unified threat management (UTM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

distribute client requests across server nodes
in a farm or pool.

A

load balancer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

is one that is no longer directly supported by its vendor. This might be because the vendor has gone out of business or formally deprecated use of the product.

A

End of Life (EOL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

refers to any older system still in use, which may or may not be at its EOL stage, potentially still receiving some level of support depending on its age and vendor policy. essentially, all EOL systems are considered legacy systems, but not all legacy systems are at EOL yet.

A

Legacy Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

computer systems that are part of a larger mechanical system

A

Embedded systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

a network of devices, systems, and software used to automate and monitor industrial processes, including components like sensors, actuators, programmable logic controllers (PLCs), and a supervisory control and data acquisition (SCADA) system, allowing for centralized control of industrial operations across large geographical areas.

A

Industrial Control System (ICS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

hardware and software that monitors and controls industrial equipment, processes, and events.

A

operational technology (OT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

is a system that allows a user to interact with a machine, system, or device.

A

human-machine interface (HMI)

17
Q

is a computer system that monitors and controls industrial processes in real time.

A

supervisory control and data acquisition (SCADA)

18
Q

a network of physical devices embedded with sensors, software, and connectivity that allows them to collect and exchange data with each other and systems over the internet,

A

Internet of Things (IoT)