Networking Flashcards
A technique used to modify the destination IP address of incoming network traffic, often used in load balancing or routing.
Example: An organization uses this to redirect incoming traffic to different internal servers based on the destination IP.
DNAT (Destination Network Address Translation)
A method of subnetting that allows different subnet masks to be used within the same network, providing more efficient IP address allocation.
Example: A company uses this to allocate smaller subnets for different departments, optimizing IP address use.
VLSM (Variable Length Subnet Mask)
A high-performance routing technique that uses labels to direct data packets through a network, improving speed and efficiency, particularly for large-scale networks.
Example: used by service providers to create virtual private networks (VPNs) and ensure faster data transfer across their infrastructure.
MPLS (Multiprotocol Label Switching)
A logical subgroup within a network, created to segment traffic, improve security, and reduce congestion, even if the devices are physically on different switches.
VLAN (Virtual Local Area Network)
A list of permissions attached to an object that defines which users or systems can access that object and what actions they can perform.
ACL (Access Control List)
A security method that requires users to provide two or more verification factors to gain access to a system, enhancing security.
Example: A user logs into their account using a password and then enters a one-time code sent to their phone.
MFA (Multi-Factor Authentication)
A security solution that enforces policies for accessing a network, ensuring that devices meet security standards before being granted access
NAC (Network Access Control)
A set of rules and guidelines that define acceptable use of an organization’s resources, including network, internet, and computer systems.
AUP (Acceptable Use Policy)
A security solution designed to prevent unauthorized access, transfer, or loss of sensitive data by monitoring and controlling data flow.
Example: A file transfer is blocked because it contains sensitive information flagged by monitoring systems.
DLP (Data Loss Prevention)
A network architecture that separates the control plane from the data plane, enabling dynamic and programmatic network configuration.
Example: Traffic is automatically rerouted during peak loads to maintain performance.
SDN (Software-Defined Networking)
A Windows feature that allows individual files or folders to be encrypted to protect sensitive data from unauthorized access.
Example: A document is encrypted, ensuring it remains secure even if accessed by another user.
EFS (Encrypting File System)
A security solution that protects users from web-based threats by filtering malicious traffic, enforcing policies, and monitoring activity.
Example: Access to a harmful website is blocked to prevent exposure to malware.
SWG (Secure Web Gateway)
A security technology that monitors endpoint devices to detect, investigate, and respond to cybersecurity threats in real-time.
Example: Suspicious file activity is identified and flagged for investigation.
EDR (Endpoint Detection and Response)
A physical device used to filter traffic between networks, often placed at the perimeter to protect internal systems from external threats.
Example: A standalone device is installed at the edge of a company’s network to block unauthorized incoming connections.
Hardware Firewall
A software application installed on individual devices to monitor and control network traffic for that specific host.
Example: A device’s firewall blocks a connection attempt from a suspicious program.
Host-Based Firewall
A type of firewall that acts as an intermediary between users and the internet, filtering traffic and preventing direct connections for added security.
Example: Requests to websites are routed through an intermediary to check for malicious content before allowing access.
Proxy Firewall
A firewall deployed to protect an entire network by monitoring and controlling traffic at the network boundary.
Example: Rules are configured to block unauthorized access to sensitive internal servers.
Network-Based Firewall
A firewall deployed to protect an entire network by monitoring and controlling traffic at the network boundary.
Example: Rules are configured to block unauthorized access to sensitive internal servers.
Personal Firewall
A security system that monitors network traffic for suspicious activity or known threats and generates alerts for potential incidents.
Example: Suspicious network activity is detected, and an alert is sent to the security team for review.
NIDS (Network Intrusion Detection System)
A security system that monitors a specific device or host for unusual or malicious activity, such as file changes or unauthorized access.
Example: File integrity changes are flagged on a server after a potential breach attempt.
HIDS (Host Intrusion Detection System)
A security system that actively monitors network traffic and takes action to block or mitigate identified threats.
Example: A threat is detected on the network, and malicious packets are automatically dropped.
NIPS (Network Intrusion Prevention System)
A security system that protects an individual host by detecting and preventing malicious activity on that device.
Example: An attempt to exploit a vulnerability is stopped before it can execute on the machine.
HIPS (Host Intrusion Prevention System)
A contract between a service provider and a customer that defines the level of service expected, including performance metrics, uptime guarantees, and responsibilities.
Example: A document specifies that a cloud provider must maintain 99.9% uptime for hosted applications.
Service Level Agreement (SLA)
A framework that outlines the shared security and operational responsibilities between a cloud provider and the customer.
Example: The provider ensures the physical security of servers, while the customer manages access control for their virtual machines.
Cloud Responsibility Matrix
A broad contract that establishes the general terms and conditions governing a business relationship between two parties, often used before specific agreements are made.
Example: A company signs a document outlining terms for future engagements with a managed IT services provider.
Master Service Agreement (MSA)
A cloud computing model that combines public and private cloud environments, allowing data and applications to move between them for greater flexibility and scalability.
Example: A company stores sensitive data in a private environment while using a public provider for less critical workloads.
Hybrid Cloud
A cloud computing model that provides virtualized computing resources such as servers, storage, and networking on a pay-as-you-go basis.
Example: A company uses an online provider to deploy virtual servers instead of maintaining physical hardware.
IaaS (Infrastructure as a Service)
A subset of artificial intelligence where systems learn and improve from data without being explicitly programmed.
Example: A program analyzes customer behavior data to predict future purchases.
ML (Machine Learning)
A practice where infrastructure is provisioned and managed using code instead of manual processes, ensuring consistency and automation.
Example: A script is used to automatically deploy and configure servers in a cloud environment.
IaC (Infrastructure as Code)
An organization that offers cloud computing services, such as storage, infrastructure, or software, to customers over the internet.
Example: A business uses an online provider to host its data and applications in a virtual environment.
CSP (Cloud Service Provider)
A company that provides internet access to individuals and organizations through various technologies like DSL, fiber, or wireless.
Example: A home user connects to the internet through a service package purchased from a local provider.
ISP (Internet Service Provider)
A third-party company that remotely manages and supports a customer’s IT infrastructure and end-user systems.
Example: An organization outsources its network monitoring and maintenance to a specialized provider.
MSP (Managed Service Provider)
An entity that authenticates and manages user identities, often in a federated or single sign-on (SSO) system.
Example: A user logs into multiple applications with one set of credentials verified by an external service.
IdP (Identity Provider)
The practice of dividing a network into smaller segments or zones to improve security and performance by limiting access and containing threats.
Example: Critical servers are placed in a separate segment to restrict access and minimize exposure to threats.
Network Segmentation
A security measure where a system or network is physically isolated from other systems and networks to prevent unauthorized access or data transfer.
Example: Sensitive data is stored on a system with no internet connection, ensuring it cannot be remotely accessed.
Air Gap
A method of securing communication cables by using physical barriers, such as conduits or shielding, to prevent tampering or eavesdropping.
Example: Fiber optic cables are enclosed in protective conduit to safeguard against physical access.
Protected Cable Distribution
A network device that connects devices within a local area network (LAN) and forwards data based on MAC addresses.
Example: Data packets are directed to the appropriate device within the network, reducing unnecessary traffic.
Switch
A logical subdivision of a physical network that isolates traffic and improves security and efficiency.
Example: Employees from different departments are placed in separate logical groups, even if they share the same physical hardware.
VLAN (Virtual Local Area Network)
A network segment separated by two firewalls, designed to provide an additional layer of security for public-facing services like web servers.
Example: A web server accessible from the internet is isolated to prevent attackers from reaching internal systems.
Screened Subnet
A network device that forwards data packets between networks based on IP addresses and provides inter-network communication.
Example: Traffic between a home network and the internet is managed and directed appropriately.
Router
A cloud computing model where software applications are delivered over the internet on a subscription basis, eliminating the need for local installation or maintenance.
Example: A user accesses an email platform through a web browser without needing to install any software.
SaaS (Software as a Service)
A technology that allows users to access a virtualized desktop environment hosted on a central server, enabling remote access to desktop systems.
Example: Employees access their desktop work environments from home using a secure remote connection.
VDI (Virtual Desktop Infrastructure)
A protocol used to monitor and manage devices on a network, such as routers, switches, and servers, by collecting data and issuing commands.
Example: A network administrator uses SNMP to gather performance metrics from network routers to ensure optimal operation.
SNMP (Simple Network Management Protocol)
A computing model where data processing occurs closer to the data source or “edge” of the network, reducing latency and improving speed for real-time applications.
Example: A smart camera processes video locally instead of sending it to a central server, reducing delays.
Edge Computing
A lightweight virtualization method that allows applications and their dependencies to be packaged together in isolated units called containers, making them portable across different environments.
Example: A developer packages an app with its dependencies into a container for deployment on any cloud platform.
Containerization
A technology that creates virtual versions of physical resources, such as servers, storage, and networks, allowing multiple virtual machines to run on a single physical host.
Example: A single server hosts multiple virtual machines, each running its own operating system and applications.
Virtualization
A model of delivering computing services (such as servers, storage, databases, and software) over the internet, allowing on-demand access to resources without maintaining physical infrastructure.
Example: A company uses cloud storage to back up its data, eliminating the need for physical servers.
Cloud Computing
A technique where multiple computers or servers are linked together to work as a single system, improving performance, scalability, and fault tolerance.
Example: A website is hosted on a cluster of servers to ensure continuous uptime even if one server fails.
Clustering
A technology that allows a single physical processor core to act as two logical processors, improving parallel processing and overall performance.
Example: A processor runs multiple threads simultaneously, improving multitasking capabilities.
Hyperthreading
The ability of an operating system to execute multiple tasks or processes at the same time, typically by rapidly switching between them.
Example: A user listens to music while browsing the web, with both processes running simultaneously.
Multitasking
A system used to monitor and control industrial processes, such as manufacturing, energy, and water treatment, often using real-time data and automation.
Example: A plant’s temperature control system is managed by an ICS to ensure optimal production conditions.
ICS (Industrial Control System)
A small, localized network typically used to connect devices within a close proximity, such as smartphones, laptops, and wearables.
Example: A smartphone is connected to a wireless headset via Bluetooth, forming a PAN.
PAN (Personal Area Network)
A network of interconnected devices and objects that communicate and exchange data with each other over the internet, enabling automation and remote monitoring.
Example: A smart thermostat adjusts the temperature of a home based on data from sensors and user preferences.
IoT (Internet of Things)
An integrated circuit that combines multiple components of a computer or electronic system, such as a processor, memory, and input/output interfaces, onto a single chip.
Example: A smartphone uses this to integrates the CPU, GPU, and wireless communication components for efficient operation.
SoC (System on a Chip)
A ruggedized computer used in industrial settings to automate and control machinery and processes, such as assembly lines or robotic arms.
Example: used to control the operation of a conveyor belt in a manufacturing plant.
PLC (Programmable Logic Controller)
A system used for monitoring and controlling industrial processes, typically through real-time data collection and analysis, to manage operations like water treatment, energy, or manufacturing.
Example: monitors the pressure and flow of water in a city’s pipeline system.
SCADA (Supervisory Control and Data Acquisition)
A user interface that allows operators to interact with and control machines or systems, often used in conjunction with PLCs or SCADA systems for monitoring and control purposes.
Example: An operator uses an this touchscreen to adjust settings on an automated production line.
HMI (Human-Machine Interface)
A software application that allows users to create, manage, and modify digital content, typically for websites, without needing technical knowledge.
Example: A website owner uses a CMS to add new blog posts and update the site’s layout.
CMS (Content Management System)
An operating system designed to manage hardware resources and execute tasks within a guaranteed time frame, essential for systems that require precise timing.
Example: An RTOS is used in embedded systems like medical devices or automotive control systems, where timely responses are critical.
RTOS (Real-Time Operating System)
A specialized computing system designed to perform dedicated functions within a larger device, often with real-time computing constraints.
Example: A microwave oven uses an embedded system to control heating cycles and user settings.
Embedded System
A design approach aimed at ensuring a system or service remains operational and accessible with minimal downtime, even in the event of failures.
Example: A website is hosted on a cluster of servers to ensure continuous availability even if one server fails.
High Availability (HA)
A system design that ensures operations continue safely or revert to a safe state in the event of a failure.
Example: A machine automatically shuts down when a critical component fails to prevent harm or damage.
Fail-Safe
A system design where, upon failure, access or connections are terminated to prevent unauthorized actions or risks.
Example: A door lock system automatically closes and locks if a security breach is detected.
Fail-Close
A system design where, upon failure, access or connections are opened to allow continued operations or minimize disruption.
Example: A fire suppression system allows a valve to open if the control system fails, letting the water flow to the sprinklers.
Fail-Open
A system design where, upon failure, security mechanisms remain active to ensure protection from threats.
Example: A fail-secure door lock stays locked during a power failure to prevent unauthorized access.
Fail-Secure
A hardware device used to monitor network traffic by creating a copy of the data flow for analysis without interrupting the actual network traffic.
Network Tap
A network port configured to carry traffic from multiple VLANs, typically used between switches or between a switch and a router.
Trunk Port
A method of copying network traffic from one port on a switch to another port for monitoring or analysis, often used in network security or troubleshooting.
Port Mirroring
A server used by attackers to remotely control compromised systems or networks, often part of a botnet or malware operation.
C2 Server (Command and Control Server)
A server that integrates various communication services such as voice, video, messaging, and conferencing into a single platform for businesses.
UC Server (Unified Communications Server)
A networking device that connects and filters traffic between two or more network segments, allowing them to communicate as one network.
Example: Data from one network segment is forwarded to another segment, enabling communication between devices on both sides.
Bridge
A computer or software that provides services, resources, or data to other computers (clients) over a network.
Example: A system processes requests and delivers content like files or web pages to users across a network.
Server
A file that provides a browser with instructions on how to automatically choose a proxy server based on the URL requested.
PAC (Proxy Auto-Configuration)
A service that automatically updates the DNS records for a domain name when the IP address of the host changes, often used with dynamic IP addresses.
Example: A home network automatically updates its DNS records when the ISP assigns a new dynamic IP address.
DDNS (Dynamic Domain Name System)
A framework for integrating authentication methods into an operating system or application, allowing administrators to configure how users are authenticated.
PAM (Pluggable Authentication Module)
A technique used to map private IP addresses to a public IP address, enabling multiple devices on a private network to share a single public IP address.
NAT (Network Address Translation)
A security solution that combines multiple security features, such as firewall, antivirus, and intrusion prevention, into a single device for streamlined management.
Example: A business uses this to manage firewall protection, content filtering, and intrusion detection from one platform.
UTM (Unified Threat Management)
A framework that allows centralized management and security of all endpoints in an organization, including desktops, laptops, mobile devices, and IoT devices.
Example: Administrators use a single platform to apply security policies to employee devices across the organization.
UEM (Unified Endpoint Management)
A system designed to detect unauthorized access or malicious activity on wireless networks by monitoring and analyzing wireless traffic.
Example: A monitoring tool detects an unknown device attempting to connect to a secure wireless network.
WIDS (Wireless Intrusion Detection System)
An advanced firewall that integrates traditional firewall functions with additional features such as application awareness, intrusion prevention, and deep packet inspection.
Example: A system inspects traffic at the application layer to block unauthorized access while identifying threats.
NGFW (Next-Generation Firewall)
A firewall designed to protect web applications by filtering and monitoring HTTP requests to prevent attacks such as SQL injection or cross-site scripting.
Example: A layer analyzes incoming web traffic to block malicious payloads targeting an online store.
WAF (Web Application Firewall)
A device or software that distributes incoming network traffic across multiple servers to ensure no single server becomes overloaded, improving performance and reliability.
Example: Traffic to a website is evenly distributed across several servers to handle high volumes of requests.
Load Balancer
A server in a network that manages user authentication, security policies, and access to resources in a Windows domain environment.
Example: A system verifies user credentials to grant access to shared files and applications in an organization.
Domain Controller
A standard for authenticating and controlling user access to a network by requiring credentials before allowing connection to the LAN or WLAN.
Example: A secure network requires a user to authenticate with a username and password before gaining access.
IEEE 802.1X (Port-Based Network Access Control)
A wireless networking standard that provides high-speed Wi-Fi with support for 5 GHz frequency, increased throughput, and multi-user MIMO (MU-MIMO).
Example: A wireless access point delivers fast internet speeds for multiple devices streaming video simultaneously.
IEEE 802.11ac (Wi-Fi 5)
A standard for preventing loops in a network by dynamically disabling redundant paths and ensuring a loop-free topology.
Example: A protocol disables one of two redundant links between switches to avoid broadcast storms.
IEEE 802.1D (Spanning Tree Protocol)
A general term used to reference all wireless networking standards within the IEEE 802.11 family, including Wi-Fi technologies like 802.11n, 802.11ac, and others.
Example: A network supports multiple wireless standards to ensure compatibility with a wide range of devices.
IEEE 802.11x (Wi-Fi Family)
A flexible authentication framework used in network access control that supports multiple authentication methods, such as passwords, certificates, and tokens.
EAP (Extensible Authentication Protocol)
An EAP method that creates an encrypted TLS tunnel to secure the authentication process, protecting credentials like usernames and passwords.
PEAP (Protected Extensible Authentication Protocol)
A proprietary authentication protocol developed by Cisco that uses dynamic WEP keys but is considered insecure due to vulnerabilities.
LEAP (Lightweight Extensible Authentication Protocol)
An EAP method developed by Cisco that provides fast and secure authentication without requiring certificates by using a Protected Access Credential (PAC).
EAP-FAST (EAP-Flexible Authentication via Secure Tunneling)
An EAP method that uses certificates for both client and server to establish mutual authentication and secure connections.
EAP-TLS (EAP-Transport Layer Security)
An EAP method that uses a TLS tunnel to secure the authentication process while supporting legacy authentication protocols like PAP and CHAP.
EAP-TTLS (EAP-Tunneled Transport Layer Security)
Transmits raw data bits over a physical medium.
Physical Layer (Layer 1)
Handles error detection, correction, and framing.
Data Link Layer (Layer 2)
Manages routing and addressing of data packets.
Network Layer (Layer 3)
Ensures reliable data transfer with error recovery.
Transport Layer (Layer 4)
Manages sessions between devices.
Session Layer (Layer 5)
Translates data formats and ensures encryption.
Presentation Layer (Layer 6)
Provides end-user services and network applications.
Application Layer (Layer 7)
A service that allows users to remotely access a network or system over a secure connection, typically using VPNs or other remote access protocols.
Example: An employee connects to their company’s internal network from home to access shared files securely.
RAS (Remote Access Service)
A VPN configuration where only some of the traffic is routed through the secure VPN connection, while other traffic accesses the internet directly.
Example: Corporate traffic is routed through the VPN, but personal browsing uses the local internet connection.
VPN Split Tunnel
A VPN configuration where all network traffic, including internet and internal resources, is routed through the secure VPN connection, providing full encryption.
Example: All traffic, including web browsing and internal communications, is sent through the VPN to ensure complete security.
VPN Full Tunnel
The unique name assigned to a wireless network to identify it, allowing devices to connect to the correct network.
Example: A user selects the correct network name from a list of nearby Wi-Fi options to connect to their home router.
SSID (Service Set Identifier)
A protocol used for centralized authentication, authorization, and accounting of users accessing network devices, providing secure communication by encrypting the entire payload.
Example: A network administrator logs into a router, and their credentials are verified through a central server using this protocol.
TACACS+ (Terminal Access Controller Access Control System Plus)
A protocol used for centralized authentication, authorization, and accounting (AAA) of users accessing network services, encrypting only the user’s password during transmission.
Example: A corporate Wi-Fi network verifies user credentials through a central authentication server before granting access.
RADIUS (Remote Authentication Dial-In User Service)
A type of HTTP cookie that is only sent over encrypted HTTPS connections, ensuring that the cookie data is not exposed to attackers through unsecured channels.
Secure cookie
A database used for managing the components of a network, storing information about devices and their statuses, which can be queried by network management systems.
MIB (Management Information Base)
A high-capacity network switch used within data centers to connect servers, storage devices, and other networking equipment, enabling efficient data traffic management.
DCS (Data Center Switch)
A system that monitors and manages network infrastructure, including devices like routers, switches, and firewalls, to ensure optimal performance and security.
NMS (Network Management System)
A device that connects a digital line (such as a T1 or T3) to a network, converting signals between different transmission formats. It often works alongside a CSU for managing the connection.
DSU (Data Service Unit)
A globally unique identifier used to reference objects in network management protocols like SNMP or X.500, helping systems identify and manage objects in a network.
OID (Object Identifier)
A device that connects the user equipment (like a router or PBX) to a digital transmission line (such as T1 or T3), providing line conditioning and managing error correction.
CSU (Channel Service Unit)
A 24-bit identifier assigned by IEEE to organizations to create unique MAC addresses for network devices. The OUI forms the first part of a MAC address.
OUI (Organizationally Unique Identifier)
A network protocol developed by Cisco for collecting and analyzing IP traffic data, allowing network administrators to monitor traffic patterns, usage, and performance across networks.
Netflow
A web page that users are redirected to when they first access a network, typically for authentication or accepting terms before gaining access to the network.
Captive Portal
A network segment that isolates potentially compromised or untrusted devices to prevent them from interacting with the rest of the network until they are verified or cleaned.
Quarantine Network
A private network that allows controlled access to specific users from outside the organization, typically for sharing data or collaborating with business partners.
Extranet
A subnet in a network architecture that is protected by a firewall, often used to host services that need to be accessible from both the internal network and the internet, like a web server.
Screened Subnet
A method of web filtering that uses a software agent installed on the client device to monitor and control web traffic based on predefined policies, such as blocking access to malicious or inappropriate sites.
Agent-based Web Filtering
A security module for the Linux kernel that provides a mechanism for supporting access control security policies, including mandatory access control (MAC), which restricts how processes can interact with each other and with files.
SELinux (Security-Enhanced Linux)