Lesson 6: Networking Devices Flashcards
A list of rules or policies programmed into a router or other device to control what can gain access to a network. When used in servers ___s are used to control what resources are available to specific users or devices. When used in routers and firewalls, ___s are used to define what protocols are allowed in a network and what content various protocol packets are allowed to bring into the network.
Access Control List (ACL)
A type of network connection device that repeats all incoming signals from one connected computer and transmits them out to all of the other connected computers. To function properly, a(n) _____ _____ must be connected directly to a power source.
Active Hub
A load-balancing methodology that involves varying throughput to a network’s devices or segments based on the speed and capacity of the items receiving the data. As a result, some devices will get a heavier workload than others.
Asymmetric Loading
A software or hardware based network management technology that enables administrators to optimize how a network uses its available bandwidth by managing and/or controlling network utilization.(See Bandwidth Shaping/Traffic Shaping.)
Bandwidth Shaper
A process that involves managing and/or controlling network usage in order to optimize how a network uses its available bandwidth. Also known as traffic shaping.
Bandwidth Shaping
The IDS/IPS creates a baseline for a network’s normal activity or _____ and then uses that baseline to look for any activity or _____ on the network that differs from what it considers to be normal activity. When such a divergence from the baseline is detected the IDS/IPS takes the action it is programmed to do against the threat. The main weakness of _____-_____ _____ is that it tends to produce a high number of false-positive detections. This means that it has a tendency to report activity as malicious that is not.
Behavior-Based Detection
ACLs can be set to block everything from specific IP addresses and ranges all the way up to specific ports and protocols. If one or more ACLs are in place in a router, when a router opens a packet to see what its destination is, it also runs a test on the packet to see if any ACL running on the router causes the packet to be rejected. If the packet has an IP address or contains a protocol or port that an ACL says is not to be allowed into the network, the router will discard the packet and not allow it entry into the network.
Block/Allow
A device intended to break up networks into smaller sections. A _____ is similar to a switch, except with fewer ports. Because _____ work on the Data Link layer of the OSI Model, they manage data traffic rather than simply rebroadcast to neighboring network segments.
Bridge
A technology that allows a faster network device to process a request from a slower network device quickly and store it in a region of memory, called a buffer, designed to hold data temporarily while it’s being moved from one place to another.
Buffering
A technology in which a specific memory location is set aside on a network device for storage of frequently requested information.
Caching
The physical section of a network where the various devices connected to it run the risk of having their signals collide with each other because all the devices present use a shared media.
Collision Domain
A device used to convert a digital signal from one frame format to another.
Channel Service Unit/Data Service Unit (CSU/DSU)
Specific fields in the DHCP Message packet that carry configuration parameters and control information.
DHCP Options
sometimes referred to as DDNS, a standard that has been added to the normal DNS standard. What _____ ___ does is allow a host with a changing IP address to use a permanent Fully Qualified Domain Name (FQDN). (A FQDN is basically a permanent URL or computer name within a defined network domain.) The way _____ ___ allows a host with a changing IP address to use a permanent FQDN is by automatically sending an update message to the DNS server every time the IP address changes. The RFC that fully describes Dynamic DNS is RFC 2136.
Dynamic DNS
Hardware or software components that are used to encrypt information.
Encryption Devices
A networking device designed to prevent a hacker or other security threats from entering the network or barring that limit the ability of threats to spread through the network using intrusion detection software.
Firewall
Basically a permanent URL or computer name within a defined network domain.
Fully Qualified Domain Name (FQDN)
A type of proxy server that passes requests and replies in an unmodified form.
Gateway Proxy Server
A special purpose device that acts as a router with a large number of access control lists (ACLs) built into it which is designed to recognize activities that can be interpreted as attacks on the network and counter them.
Hardware Firewall
A device similar to a repeater that works as though it were the bus of a larger network.
Hub