Networking Flashcards

1
Q

A technique used to modify the destination IP address of incoming network traffic, often used in load balancing or routing.

Example: An organization uses this to redirect incoming traffic to different internal servers based on the destination IP.

A

DNAT (Destination Network Address Translation)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A method of subnetting that allows different subnet masks to be used within the same network, providing more efficient IP address allocation.

Example: A company uses this to allocate smaller subnets for different departments, optimizing IP address use.

A

VLSM (Variable Length Subnet Mask)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A high-performance routing technique that uses labels to direct data packets through a network, improving speed and efficiency, particularly for large-scale networks.

Example: used by service providers to create virtual private networks (VPNs) and ensure faster data transfer across their infrastructure.

A

MPLS (Multiprotocol Label Switching)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A logical subgroup within a network, created to segment traffic, improve security, and reduce congestion, even if the devices are physically on different switches.

A

VLAN (Virtual Local Area Network)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A list of permissions attached to an object that defines which users or systems can access that object and what actions they can perform.

A

ACL (Access Control List)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A security method that requires users to provide two or more verification factors to gain access to a system, enhancing security.

Example: A user logs into their account using a password and then enters a one-time code sent to their phone.

A

MFA (Multi-Factor Authentication)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A security solution that enforces policies for accessing a network, ensuring that devices meet security standards before being granted access

A

NAC (Network Access Control)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A set of rules and guidelines that define acceptable use of an organization’s resources, including network, internet, and computer systems.

A

AUP (Acceptable Use Policy)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A security solution designed to prevent unauthorized access, transfer, or loss of sensitive data by monitoring and controlling data flow.

Example: A file transfer is blocked because it contains sensitive information flagged by monitoring systems.

A

DLP (Data Loss Prevention)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A network architecture that separates the control plane from the data plane, enabling dynamic and programmatic network configuration.

Example: Traffic is automatically rerouted during peak loads to maintain performance.

A

SDN (Software-Defined Networking)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A Windows feature that allows individual files or folders to be encrypted to protect sensitive data from unauthorized access.

Example: A document is encrypted, ensuring it remains secure even if accessed by another user.

A

EFS (Encrypting File System)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A security solution that protects users from web-based threats by filtering malicious traffic, enforcing policies, and monitoring activity.

Example: Access to a harmful website is blocked to prevent exposure to malware.

A

SWG (Secure Web Gateway)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A security technology that monitors endpoint devices to detect, investigate, and respond to cybersecurity threats in real-time.

Example: Suspicious file activity is identified and flagged for investigation.

A

EDR (Endpoint Detection and Response)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A physical device used to filter traffic between networks, often placed at the perimeter to protect internal systems from external threats.

Example: A standalone device is installed at the edge of a company’s network to block unauthorized incoming connections.

A

Hardware Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A software application installed on individual devices to monitor and control network traffic for that specific host.

Example: A device’s firewall blocks a connection attempt from a suspicious program.

A

Host-Based Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A type of firewall that acts as an intermediary between users and the internet, filtering traffic and preventing direct connections for added security.

Example: Requests to websites are routed through an intermediary to check for malicious content before allowing access.

A

Proxy Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A firewall deployed to protect an entire network by monitoring and controlling traffic at the network boundary.

Example: Rules are configured to block unauthorized access to sensitive internal servers.

A

Network-Based Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A firewall deployed to protect an entire network by monitoring and controlling traffic at the network boundary.

Example: Rules are configured to block unauthorized access to sensitive internal servers.

A

Personal Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A security system that monitors network traffic for suspicious activity or known threats and generates alerts for potential incidents.

Example: Suspicious network activity is detected, and an alert is sent to the security team for review.

A

NIDS (Network Intrusion Detection System)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A security system that monitors a specific device or host for unusual or malicious activity, such as file changes or unauthorized access.

Example: File integrity changes are flagged on a server after a potential breach attempt.

A

HIDS (Host Intrusion Detection System)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A security system that actively monitors network traffic and takes action to block or mitigate identified threats.

Example: A threat is detected on the network, and malicious packets are automatically dropped.

A

NIPS (Network Intrusion Prevention System)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A security system that protects an individual host by detecting and preventing malicious activity on that device.

Example: An attempt to exploit a vulnerability is stopped before it can execute on the machine.

A

HIPS (Host Intrusion Prevention System)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A contract between a service provider and a customer that defines the level of service expected, including performance metrics, uptime guarantees, and responsibilities.

Example: A document specifies that a cloud provider must maintain 99.9% uptime for hosted applications.

A

Service Level Agreement (SLA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A framework that outlines the shared security and operational responsibilities between a cloud provider and the customer.

Example: The provider ensures the physical security of servers, while the customer manages access control for their virtual machines.

A

Cloud Responsibility Matrix

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

A broad contract that establishes the general terms and conditions governing a business relationship between two parties, often used before specific agreements are made.

Example: A company signs a document outlining terms for future engagements with a managed IT services provider.

A

Master Service Agreement (MSA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

A cloud computing model that combines public and private cloud environments, allowing data and applications to move between them for greater flexibility and scalability.

Example: A company stores sensitive data in a private environment while using a public provider for less critical workloads.

A

Hybrid Cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

A cloud computing model that provides virtualized computing resources such as servers, storage, and networking on a pay-as-you-go basis.

Example: A company uses an online provider to deploy virtual servers instead of maintaining physical hardware.

A

IaaS (Infrastructure as a Service)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

A subset of artificial intelligence where systems learn and improve from data without being explicitly programmed.

Example: A program analyzes customer behavior data to predict future purchases.

A

ML (Machine Learning)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

A practice where infrastructure is provisioned and managed using code instead of manual processes, ensuring consistency and automation.

Example: A script is used to automatically deploy and configure servers in a cloud environment.

A

IaC (Infrastructure as Code)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

An organization that offers cloud computing services, such as storage, infrastructure, or software, to customers over the internet.

Example: A business uses an online provider to host its data and applications in a virtual environment.

A

CSP (Cloud Service Provider)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

A company that provides internet access to individuals and organizations through various technologies like DSL, fiber, or wireless.

Example: A home user connects to the internet through a service package purchased from a local provider.

A

ISP (Internet Service Provider)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

A third-party company that remotely manages and supports a customer’s IT infrastructure and end-user systems.

Example: An organization outsources its network monitoring and maintenance to a specialized provider.

A

MSP (Managed Service Provider)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

An entity that authenticates and manages user identities, often in a federated or single sign-on (SSO) system.

Example: A user logs into multiple applications with one set of credentials verified by an external service.

A

IdP (Identity Provider)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

The practice of dividing a network into smaller segments or zones to improve security and performance by limiting access and containing threats.

Example: Critical servers are placed in a separate segment to restrict access and minimize exposure to threats.

A

Network Segmentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

A security measure where a system or network is physically isolated from other systems and networks to prevent unauthorized access or data transfer.

Example: Sensitive data is stored on a system with no internet connection, ensuring it cannot be remotely accessed.

A

Air Gap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

A method of securing communication cables by using physical barriers, such as conduits or shielding, to prevent tampering or eavesdropping.

Example: Fiber optic cables are enclosed in protective conduit to safeguard against physical access.

A

Protected Cable Distribution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

A network device that connects devices within a local area network (LAN) and forwards data based on MAC addresses.

Example: Data packets are directed to the appropriate device within the network, reducing unnecessary traffic.

A

Switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

A logical subdivision of a physical network that isolates traffic and improves security and efficiency.

Example: Employees from different departments are placed in separate logical groups, even if they share the same physical hardware.

A

VLAN (Virtual Local Area Network)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

A network segment separated by two firewalls, designed to provide an additional layer of security for public-facing services like web servers.

Example: A web server accessible from the internet is isolated to prevent attackers from reaching internal systems.

A

Screened Subnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

A network device that forwards data packets between networks based on IP addresses and provides inter-network communication.

Example: Traffic between a home network and the internet is managed and directed appropriately.

A

Router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

A cloud computing model where software applications are delivered over the internet on a subscription basis, eliminating the need for local installation or maintenance.

Example: A user accesses an email platform through a web browser without needing to install any software.

A

SaaS (Software as a Service)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

A technology that allows users to access a virtualized desktop environment hosted on a central server, enabling remote access to desktop systems.

Example: Employees access their desktop work environments from home using a secure remote connection.

A

VDI (Virtual Desktop Infrastructure)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

A protocol used to monitor and manage devices on a network, such as routers, switches, and servers, by collecting data and issuing commands.

Example: A network administrator uses SNMP to gather performance metrics from network routers to ensure optimal operation.

A

SNMP (Simple Network Management Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

A computing model where data processing occurs closer to the data source or “edge” of the network, reducing latency and improving speed for real-time applications.

Example: A smart camera processes video locally instead of sending it to a central server, reducing delays.

A

Edge Computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

A lightweight virtualization method that allows applications and their dependencies to be packaged together in isolated units called containers, making them portable across different environments.

Example: A developer packages an app with its dependencies into a container for deployment on any cloud platform.

A

Containerization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

A technology that creates virtual versions of physical resources, such as servers, storage, and networks, allowing multiple virtual machines to run on a single physical host.

Example: A single server hosts multiple virtual machines, each running its own operating system and applications.

A

Virtualization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

A model of delivering computing services (such as servers, storage, databases, and software) over the internet, allowing on-demand access to resources without maintaining physical infrastructure.

Example: A company uses cloud storage to back up its data, eliminating the need for physical servers.

A

Cloud Computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

A technique where multiple computers or servers are linked together to work as a single system, improving performance, scalability, and fault tolerance.

Example: A website is hosted on a cluster of servers to ensure continuous uptime even if one server fails.

A

Clustering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

A technology that allows a single physical processor core to act as two logical processors, improving parallel processing and overall performance.

Example: A processor runs multiple threads simultaneously, improving multitasking capabilities.

A

Hyperthreading

50
Q

The ability of an operating system to execute multiple tasks or processes at the same time, typically by rapidly switching between them.

Example: A user listens to music while browsing the web, with both processes running simultaneously.

A

Multitasking

51
Q

A system used to monitor and control industrial processes, such as manufacturing, energy, and water treatment, often using real-time data and automation.

Example: A plant’s temperature control system is managed by an ICS to ensure optimal production conditions.

A

ICS (Industrial Control System)

52
Q

A small, localized network typically used to connect devices within a close proximity, such as smartphones, laptops, and wearables.

Example: A smartphone is connected to a wireless headset via Bluetooth, forming a PAN.

A

PAN (Personal Area Network)

53
Q

A network of interconnected devices and objects that communicate and exchange data with each other over the internet, enabling automation and remote monitoring.

Example: A smart thermostat adjusts the temperature of a home based on data from sensors and user preferences.

A

IoT (Internet of Things)

54
Q

An integrated circuit that combines multiple components of a computer or electronic system, such as a processor, memory, and input/output interfaces, onto a single chip.

Example: A smartphone uses this to integrates the CPU, GPU, and wireless communication components for efficient operation.

A

SoC (System on a Chip)

55
Q

A ruggedized computer used in industrial settings to automate and control machinery and processes, such as assembly lines or robotic arms.

Example: used to control the operation of a conveyor belt in a manufacturing plant.

A

PLC (Programmable Logic Controller)

56
Q

A system used for monitoring and controlling industrial processes, typically through real-time data collection and analysis, to manage operations like water treatment, energy, or manufacturing.

Example: monitors the pressure and flow of water in a city’s pipeline system.

A

SCADA (Supervisory Control and Data Acquisition)

57
Q

A user interface that allows operators to interact with and control machines or systems, often used in conjunction with PLCs or SCADA systems for monitoring and control purposes.

Example: An operator uses an this touchscreen to adjust settings on an automated production line.

A

HMI (Human-Machine Interface)

58
Q

A software application that allows users to create, manage, and modify digital content, typically for websites, without needing technical knowledge.

Example: A website owner uses a CMS to add new blog posts and update the site’s layout.

A

CMS (Content Management System)

59
Q

An operating system designed to manage hardware resources and execute tasks within a guaranteed time frame, essential for systems that require precise timing.

Example: An RTOS is used in embedded systems like medical devices or automotive control systems, where timely responses are critical.

A

RTOS (Real-Time Operating System)

60
Q

A specialized computing system designed to perform dedicated functions within a larger device, often with real-time computing constraints.

Example: A microwave oven uses an embedded system to control heating cycles and user settings.

A

Embedded System

61
Q

A design approach aimed at ensuring a system or service remains operational and accessible with minimal downtime, even in the event of failures.

Example: A website is hosted on a cluster of servers to ensure continuous availability even if one server fails.

A

High Availability (HA)

62
Q

A system design that ensures operations continue safely or revert to a safe state in the event of a failure.

Example: A machine automatically shuts down when a critical component fails to prevent harm or damage.

A

Fail-Safe

63
Q

A system design where, upon failure, access or connections are terminated to prevent unauthorized actions or risks.

Example: A door lock system automatically closes and locks if a security breach is detected.

A

Fail-Close

64
Q

A system design where, upon failure, access or connections are opened to allow continued operations or minimize disruption.

Example: A fire suppression system allows a valve to open if the control system fails, letting the water flow to the sprinklers.

A

Fail-Open

65
Q

A system design where, upon failure, security mechanisms remain active to ensure protection from threats.

Example: A fail-secure door lock stays locked during a power failure to prevent unauthorized access.

A

Fail-Secure

66
Q

A hardware device used to monitor network traffic by creating a copy of the data flow for analysis without interrupting the actual network traffic.

A

Network Tap

67
Q

A network port configured to carry traffic from multiple VLANs, typically used between switches or between a switch and a router.

A

Trunk Port

68
Q

A method of copying network traffic from one port on a switch to another port for monitoring or analysis, often used in network security or troubleshooting.

A

Port Mirroring

69
Q

A server used by attackers to remotely control compromised systems or networks, often part of a botnet or malware operation.

A

C2 Server (Command and Control Server)

70
Q

A server that integrates various communication services such as voice, video, messaging, and conferencing into a single platform for businesses.

A

UC Server (Unified Communications Server)

71
Q

A networking device that connects and filters traffic between two or more network segments, allowing them to communicate as one network.

Example: Data from one network segment is forwarded to another segment, enabling communication between devices on both sides.

A

Bridge

72
Q

A computer or software that provides services, resources, or data to other computers (clients) over a network.

Example: A system processes requests and delivers content like files or web pages to users across a network.

A

Server

73
Q

A file that provides a browser with instructions on how to automatically choose a proxy server based on the URL requested.

A

PAC (Proxy Auto-Configuration)

74
Q

A service that automatically updates the DNS records for a domain name when the IP address of the host changes, often used with dynamic IP addresses.

Example: A home network automatically updates its DNS records when the ISP assigns a new dynamic IP address.

A

DDNS (Dynamic Domain Name System)

75
Q

A framework for integrating authentication methods into an operating system or application, allowing administrators to configure how users are authenticated.

A

PAM (Pluggable Authentication Module)

76
Q

A technique used to map private IP addresses to a public IP address, enabling multiple devices on a private network to share a single public IP address.

A

NAT (Network Address Translation)

77
Q

A security solution that combines multiple security features, such as firewall, antivirus, and intrusion prevention, into a single device for streamlined management.

Example: A business uses this to manage firewall protection, content filtering, and intrusion detection from one platform.

A

UTM (Unified Threat Management)

78
Q

A framework that allows centralized management and security of all endpoints in an organization, including desktops, laptops, mobile devices, and IoT devices.

Example: Administrators use a single platform to apply security policies to employee devices across the organization.

A

UEM (Unified Endpoint Management)

79
Q

A system designed to detect unauthorized access or malicious activity on wireless networks by monitoring and analyzing wireless traffic.

Example: A monitoring tool detects an unknown device attempting to connect to a secure wireless network.

A

WIDS (Wireless Intrusion Detection System)

80
Q

An advanced firewall that integrates traditional firewall functions with additional features such as application awareness, intrusion prevention, and deep packet inspection.

Example: A system inspects traffic at the application layer to block unauthorized access while identifying threats.

A

NGFW (Next-Generation Firewall)

81
Q

A firewall designed to protect web applications by filtering and monitoring HTTP requests to prevent attacks such as SQL injection or cross-site scripting.

Example: A layer analyzes incoming web traffic to block malicious payloads targeting an online store.

A

WAF (Web Application Firewall)

82
Q

A device or software that distributes incoming network traffic across multiple servers to ensure no single server becomes overloaded, improving performance and reliability.

Example: Traffic to a website is evenly distributed across several servers to handle high volumes of requests.

A

Load Balancer

83
Q

A server in a network that manages user authentication, security policies, and access to resources in a Windows domain environment.

Example: A system verifies user credentials to grant access to shared files and applications in an organization.

A

Domain Controller

84
Q

A standard for authenticating and controlling user access to a network by requiring credentials before allowing connection to the LAN or WLAN.

Example: A secure network requires a user to authenticate with a username and password before gaining access.

A

IEEE 802.1X (Port-Based Network Access Control)

85
Q

A wireless networking standard that provides high-speed Wi-Fi with support for 5 GHz frequency, increased throughput, and multi-user MIMO (MU-MIMO).

Example: A wireless access point delivers fast internet speeds for multiple devices streaming video simultaneously.

A

IEEE 802.11ac (Wi-Fi 5)

86
Q

A standard for preventing loops in a network by dynamically disabling redundant paths and ensuring a loop-free topology.

Example: A protocol disables one of two redundant links between switches to avoid broadcast storms.

A

IEEE 802.1D (Spanning Tree Protocol)

87
Q

A general term used to reference all wireless networking standards within the IEEE 802.11 family, including Wi-Fi technologies like 802.11n, 802.11ac, and others.

Example: A network supports multiple wireless standards to ensure compatibility with a wide range of devices.

A

IEEE 802.11x (Wi-Fi Family)

88
Q

A flexible authentication framework used in network access control that supports multiple authentication methods, such as passwords, certificates, and tokens.

A

EAP (Extensible Authentication Protocol)

89
Q

An EAP method that creates an encrypted TLS tunnel to secure the authentication process, protecting credentials like usernames and passwords.

A

PEAP (Protected Extensible Authentication Protocol)

90
Q

A proprietary authentication protocol developed by Cisco that uses dynamic WEP keys but is considered insecure due to vulnerabilities.

A

LEAP (Lightweight Extensible Authentication Protocol)

91
Q

An EAP method developed by Cisco that provides fast and secure authentication without requiring certificates by using a Protected Access Credential (PAC).

A

EAP-FAST (EAP-Flexible Authentication via Secure Tunneling)

92
Q

An EAP method that uses certificates for both client and server to establish mutual authentication and secure connections.

A

EAP-TLS (EAP-Transport Layer Security)

93
Q

An EAP method that uses a TLS tunnel to secure the authentication process while supporting legacy authentication protocols like PAP and CHAP.

A

EAP-TTLS (EAP-Tunneled Transport Layer Security)

94
Q

Transmits raw data bits over a physical medium.

A

Physical Layer (Layer 1)

95
Q

Handles error detection, correction, and framing.

A

Data Link Layer (Layer 2)

96
Q

Manages routing and addressing of data packets.

A

Network Layer (Layer 3)

97
Q

Ensures reliable data transfer with error recovery.

A

Transport Layer (Layer 4)

98
Q

Manages sessions between devices.

A

Session Layer (Layer 5)

99
Q

Translates data formats and ensures encryption.

A

Presentation Layer (Layer 6)

100
Q

Provides end-user services and network applications.

A

Application Layer (Layer 7)

101
Q

A service that allows users to remotely access a network or system over a secure connection, typically using VPNs or other remote access protocols.

Example: An employee connects to their company’s internal network from home to access shared files securely.

A

RAS (Remote Access Service)

102
Q

A VPN configuration where only some of the traffic is routed through the secure VPN connection, while other traffic accesses the internet directly.

Example: Corporate traffic is routed through the VPN, but personal browsing uses the local internet connection.

A

VPN Split Tunnel

103
Q

A VPN configuration where all network traffic, including internet and internal resources, is routed through the secure VPN connection, providing full encryption.

Example: All traffic, including web browsing and internal communications, is sent through the VPN to ensure complete security.

A

VPN Full Tunnel

104
Q

The unique name assigned to a wireless network to identify it, allowing devices to connect to the correct network.

Example: A user selects the correct network name from a list of nearby Wi-Fi options to connect to their home router.

A

SSID (Service Set Identifier)

105
Q

A protocol used for centralized authentication, authorization, and accounting of users accessing network devices, providing secure communication by encrypting the entire payload.

Example: A network administrator logs into a router, and their credentials are verified through a central server using this protocol.

A

TACACS+ (Terminal Access Controller Access Control System Plus)

106
Q

A protocol used for centralized authentication, authorization, and accounting (AAA) of users accessing network services, encrypting only the user’s password during transmission.

Example: A corporate Wi-Fi network verifies user credentials through a central authentication server before granting access.

A

RADIUS (Remote Authentication Dial-In User Service)

107
Q

A type of HTTP cookie that is only sent over encrypted HTTPS connections, ensuring that the cookie data is not exposed to attackers through unsecured channels.

A

Secure cookie

108
Q

A database used for managing the components of a network, storing information about devices and their statuses, which can be queried by network management systems.

A

MIB (Management Information Base)

109
Q

A high-capacity network switch used within data centers to connect servers, storage devices, and other networking equipment, enabling efficient data traffic management.

A

DCS (Data Center Switch)

110
Q

A system that monitors and manages network infrastructure, including devices like routers, switches, and firewalls, to ensure optimal performance and security.

A

NMS (Network Management System)

111
Q

A device that connects a digital line (such as a T1 or T3) to a network, converting signals between different transmission formats. It often works alongside a CSU for managing the connection.

A

DSU (Data Service Unit)

112
Q

A globally unique identifier used to reference objects in network management protocols like SNMP or X.500, helping systems identify and manage objects in a network.

A

OID (Object Identifier)

113
Q

A device that connects the user equipment (like a router or PBX) to a digital transmission line (such as T1 or T3), providing line conditioning and managing error correction.

A

CSU (Channel Service Unit)

114
Q

A 24-bit identifier assigned by IEEE to organizations to create unique MAC addresses for network devices. The OUI forms the first part of a MAC address.

A

OUI (Organizationally Unique Identifier)

115
Q

A network protocol developed by Cisco for collecting and analyzing IP traffic data, allowing network administrators to monitor traffic patterns, usage, and performance across networks.

A

Netflow

116
Q

A web page that users are redirected to when they first access a network, typically for authentication or accepting terms before gaining access to the network.

A

Captive Portal

117
Q

A network segment that isolates potentially compromised or untrusted devices to prevent them from interacting with the rest of the network until they are verified or cleaned.

A

Quarantine Network

118
Q

A private network that allows controlled access to specific users from outside the organization, typically for sharing data or collaborating with business partners.

A

Extranet

119
Q

A subnet in a network architecture that is protected by a firewall, often used to host services that need to be accessible from both the internal network and the internet, like a web server.

A

Screened Subnet

120
Q

A method of web filtering that uses a software agent installed on the client device to monitor and control web traffic based on predefined policies, such as blocking access to malicious or inappropriate sites.

A

Agent-based Web Filtering

121
Q

A security module for the Linux kernel that provides a mechanism for supporting access control security policies, including mandatory access control (MAC), which restricts how processes can interact with each other and with files.

A

SELinux (Security-Enhanced Linux)