Networking Flashcards
A technique used to modify the destination IP address of incoming network traffic, often used in load balancing or routing.
Example: An organization uses this to redirect incoming traffic to different internal servers based on the destination IP.
DNAT (Destination Network Address Translation)
A method of subnetting that allows different subnet masks to be used within the same network, providing more efficient IP address allocation.
Example: A company uses this to allocate smaller subnets for different departments, optimizing IP address use.
VLSM (Variable Length Subnet Mask)
A high-performance routing technique that uses labels to direct data packets through a network, improving speed and efficiency, particularly for large-scale networks.
Example: used by service providers to create virtual private networks (VPNs) and ensure faster data transfer across their infrastructure.
MPLS (Multiprotocol Label Switching)
A logical subgroup within a network, created to segment traffic, improve security, and reduce congestion, even if the devices are physically on different switches.
VLAN (Virtual Local Area Network)
A list of permissions attached to an object that defines which users or systems can access that object and what actions they can perform.
ACL (Access Control List)
A security method that requires users to provide two or more verification factors to gain access to a system, enhancing security.
Example: A user logs into their account using a password and then enters a one-time code sent to their phone.
MFA (Multi-Factor Authentication)
A security solution that enforces policies for accessing a network, ensuring that devices meet security standards before being granted access
NAC (Network Access Control)
A set of rules and guidelines that define acceptable use of an organization’s resources, including network, internet, and computer systems.
AUP (Acceptable Use Policy)
A security solution designed to prevent unauthorized access, transfer, or loss of sensitive data by monitoring and controlling data flow.
Example: A file transfer is blocked because it contains sensitive information flagged by monitoring systems.
DLP (Data Loss Prevention)
A network architecture that separates the control plane from the data plane, enabling dynamic and programmatic network configuration.
Example: Traffic is automatically rerouted during peak loads to maintain performance.
SDN (Software-Defined Networking)
A Windows feature that allows individual files or folders to be encrypted to protect sensitive data from unauthorized access.
Example: A document is encrypted, ensuring it remains secure even if accessed by another user.
EFS (Encrypting File System)
A security solution that protects users from web-based threats by filtering malicious traffic, enforcing policies, and monitoring activity.
Example: Access to a harmful website is blocked to prevent exposure to malware.
SWG (Secure Web Gateway)
A security technology that monitors endpoint devices to detect, investigate, and respond to cybersecurity threats in real-time.
Example: Suspicious file activity is identified and flagged for investigation.
EDR (Endpoint Detection and Response)
A physical device used to filter traffic between networks, often placed at the perimeter to protect internal systems from external threats.
Example: A standalone device is installed at the edge of a company’s network to block unauthorized incoming connections.
Hardware Firewall
A software application installed on individual devices to monitor and control network traffic for that specific host.
Example: A device’s firewall blocks a connection attempt from a suspicious program.
Host-Based Firewall
A type of firewall that acts as an intermediary between users and the internet, filtering traffic and preventing direct connections for added security.
Example: Requests to websites are routed through an intermediary to check for malicious content before allowing access.
Proxy Firewall
A firewall deployed to protect an entire network by monitoring and controlling traffic at the network boundary.
Example: Rules are configured to block unauthorized access to sensitive internal servers.
Network-Based Firewall
A firewall deployed to protect an entire network by monitoring and controlling traffic at the network boundary.
Example: Rules are configured to block unauthorized access to sensitive internal servers.
Personal Firewall
A security system that monitors network traffic for suspicious activity or known threats and generates alerts for potential incidents.
Example: Suspicious network activity is detected, and an alert is sent to the security team for review.
NIDS (Network Intrusion Detection System)
A security system that monitors a specific device or host for unusual or malicious activity, such as file changes or unauthorized access.
Example: File integrity changes are flagged on a server after a potential breach attempt.
HIDS (Host Intrusion Detection System)
A security system that actively monitors network traffic and takes action to block or mitigate identified threats.
Example: A threat is detected on the network, and malicious packets are automatically dropped.
NIPS (Network Intrusion Prevention System)
A security system that protects an individual host by detecting and preventing malicious activity on that device.
Example: An attempt to exploit a vulnerability is stopped before it can execute on the machine.
HIPS (Host Intrusion Prevention System)
A contract between a service provider and a customer that defines the level of service expected, including performance metrics, uptime guarantees, and responsibilities.
Example: A document specifies that a cloud provider must maintain 99.9% uptime for hosted applications.
Service Level Agreement (SLA)
A framework that outlines the shared security and operational responsibilities between a cloud provider and the customer.
Example: The provider ensures the physical security of servers, while the customer manages access control for their virtual machines.
Cloud Responsibility Matrix
A broad contract that establishes the general terms and conditions governing a business relationship between two parties, often used before specific agreements are made.
Example: A company signs a document outlining terms for future engagements with a managed IT services provider.
Master Service Agreement (MSA)
A cloud computing model that combines public and private cloud environments, allowing data and applications to move between them for greater flexibility and scalability.
Example: A company stores sensitive data in a private environment while using a public provider for less critical workloads.
Hybrid Cloud
A cloud computing model that provides virtualized computing resources such as servers, storage, and networking on a pay-as-you-go basis.
Example: A company uses an online provider to deploy virtual servers instead of maintaining physical hardware.
IaaS (Infrastructure as a Service)
A subset of artificial intelligence where systems learn and improve from data without being explicitly programmed.
Example: A program analyzes customer behavior data to predict future purchases.
ML (Machine Learning)
A practice where infrastructure is provisioned and managed using code instead of manual processes, ensuring consistency and automation.
Example: A script is used to automatically deploy and configure servers in a cloud environment.
IaC (Infrastructure as Code)
An organization that offers cloud computing services, such as storage, infrastructure, or software, to customers over the internet.
Example: A business uses an online provider to host its data and applications in a virtual environment.
CSP (Cloud Service Provider)
A company that provides internet access to individuals and organizations through various technologies like DSL, fiber, or wireless.
Example: A home user connects to the internet through a service package purchased from a local provider.
ISP (Internet Service Provider)
A third-party company that remotely manages and supports a customer’s IT infrastructure and end-user systems.
Example: An organization outsources its network monitoring and maintenance to a specialized provider.
MSP (Managed Service Provider)
An entity that authenticates and manages user identities, often in a federated or single sign-on (SSO) system.
Example: A user logs into multiple applications with one set of credentials verified by an external service.
IdP (Identity Provider)
The practice of dividing a network into smaller segments or zones to improve security and performance by limiting access and containing threats.
Example: Critical servers are placed in a separate segment to restrict access and minimize exposure to threats.
Network Segmentation
A security measure where a system or network is physically isolated from other systems and networks to prevent unauthorized access or data transfer.
Example: Sensitive data is stored on a system with no internet connection, ensuring it cannot be remotely accessed.
Air Gap
A method of securing communication cables by using physical barriers, such as conduits or shielding, to prevent tampering or eavesdropping.
Example: Fiber optic cables are enclosed in protective conduit to safeguard against physical access.
Protected Cable Distribution
A network device that connects devices within a local area network (LAN) and forwards data based on MAC addresses.
Example: Data packets are directed to the appropriate device within the network, reducing unnecessary traffic.
Switch
A logical subdivision of a physical network that isolates traffic and improves security and efficiency.
Example: Employees from different departments are placed in separate logical groups, even if they share the same physical hardware.
VLAN (Virtual Local Area Network)
A network segment separated by two firewalls, designed to provide an additional layer of security for public-facing services like web servers.
Example: A web server accessible from the internet is isolated to prevent attackers from reaching internal systems.
Screened Subnet
A network device that forwards data packets between networks based on IP addresses and provides inter-network communication.
Example: Traffic between a home network and the internet is managed and directed appropriately.
Router
A cloud computing model where software applications are delivered over the internet on a subscription basis, eliminating the need for local installation or maintenance.
Example: A user accesses an email platform through a web browser without needing to install any software.
SaaS (Software as a Service)
A technology that allows users to access a virtualized desktop environment hosted on a central server, enabling remote access to desktop systems.
Example: Employees access their desktop work environments from home using a secure remote connection.
VDI (Virtual Desktop Infrastructure)
A protocol used to monitor and manage devices on a network, such as routers, switches, and servers, by collecting data and issuing commands.
Example: A network administrator uses SNMP to gather performance metrics from network routers to ensure optimal operation.
SNMP (Simple Network Management Protocol)
A computing model where data processing occurs closer to the data source or “edge” of the network, reducing latency and improving speed for real-time applications.
Example: A smart camera processes video locally instead of sending it to a central server, reducing delays.
Edge Computing
A lightweight virtualization method that allows applications and their dependencies to be packaged together in isolated units called containers, making them portable across different environments.
Example: A developer packages an app with its dependencies into a container for deployment on any cloud platform.
Containerization
A technology that creates virtual versions of physical resources, such as servers, storage, and networks, allowing multiple virtual machines to run on a single physical host.
Example: A single server hosts multiple virtual machines, each running its own operating system and applications.
Virtualization
A model of delivering computing services (such as servers, storage, databases, and software) over the internet, allowing on-demand access to resources without maintaining physical infrastructure.
Example: A company uses cloud storage to back up its data, eliminating the need for physical servers.
Cloud Computing
A technique where multiple computers or servers are linked together to work as a single system, improving performance, scalability, and fault tolerance.
Example: A website is hosted on a cluster of servers to ensure continuous uptime even if one server fails.
Clustering