Network Basics Flashcards
A node that serves as the beginning or ending point of communication
Host
The physical path connecting the nodes
Media
The information carried by the media
Data
The network of interface cards, network hardware, cables, and so on that you can see when you look around the building
Physical Network
The information carried by the physical network, and the paths the information follows
Logical Network
A port-based, or static assignment creating a broadcast domain in a switch
VLAN
Carry traffic from multiple VLANs between 2 or more switches
Trunk Ports
Each VLAN needs it’s own router to communicate with other VLANs or the anything outside the LAN (True/False)
True
Four types of Network Security appliances
Firewalls
Intrusion detection and prevention systems
VPN endpoints
Unified threat management
Controls incoming and outgoing traffic, preventing unauthorized access to or from your network
Firewall
Specialized firewall network device that sits between your internal computer network and the Internet
hardware firewall
Firewall traffic control software that you install on an individual device
Software Firewall
Designed to monitor network traffic to look for signs of intrusion or other unwanted activities, evaluated by rules based on the signatures of known attacks, or by heuristic analysis which can recognize unusual or suspicious activities
Intrusion detection systems (IDS) and intrusion prevention systems (IPS)
Passive monitoring systems designed to alert administrators when something suspicious happens, but take no action on their own
IDS Intrusion detection system
Active protection systems which can block traffic, disconnect users, or take other corrective actions against an attack
IPS Intrusion prevention system
Describes a network scenario where a secure connection is created between multiple computers or LANs across an insecure external network
Virtual Private Network (VPN)
A networking device, such as a router, server, firewall, or similar device with Internetworking and data transmission capabilities that sits at the external edge of a secure internal network and requires an external device to identify and authenticate itself before the gateway creates a connection allowing access to internal network resources.
VPN Gateway
Communications protocols that provide secure data transmission over an unsecured network. Data is commonly secured using an encryption protocol such as IPsec or a tunneling protocol such as SSL/TLS.
Secure transport protocols
A simple network device that connects multiple nodes in a star configuration
Hub
A device that prevents collisions by ensuring not to send the data to a segment that is already busy
Bridge
A device that can read packets on the Internet layer to view their IP addresses and can communicate with others to find the best path through the network to any given host or subnet
Router
A device that enables the traffic to flow in and out of the network
Gateway