Chapter 5 Flashcards
MAC flooding
An attack that sends numerous packets to a switch, each of which has a
different source MAC address, in an attempt to use up the memory on the switch.
CAM table
The Content Addressable Memory table, a table that is in a switch’s
memory that contains ports and their corresponding MAC addresses.
fail-open mode
When a switch broadcasts data on all ports the way a hub does.
one-to-one mapping
When an individual certificate is mapped to a single recipient.
demilitarized zone (DMZ)
special area of the network that houses servers that host information accessed by clients or other networks
on the Internet.
3-leg perimeter
A type of DMZ where a firewall has three legs that connect to the
LAN, the Internet, and the DMZ.
back-to-back perimeter
A type of DMZ where the DMZ is located between the LAN
and the Internet.
network access control (NAC)
Sets the rules by which connections to a network are
governed.
war-dialing
The act of scanning telephone numbers by dialing them one at a time and
adding them to a list, in an attempt to gain access to computer networks.
cloud computing
A way of offering on-demand services that extend the capabilities of a
person’s computer or an organization’s network.
Infrastructure as a Service (IaaS)
A cloud computing service that offers computer
networking, storage, load balancing, routing, and VM hosting.
Platform as a Service (PaaS)
A cloud computing service that provides various software
solutions to organizations without the cost
or administration of a physical platform.
Common Vulnerabilities and Exposures (CVE)
An online list of known vulnerabilities
(and patches) to software, especially web servers. It is maintained by the MITRE
Corporation.