Chapter 6 Flashcards
(79 cards)
a set of rules to permit or restrict data from flowing into or out of a network
access control list (ACL)
a configuration in which all load balancers are always active
active-active
a configuration in which the primary load balancer distributes the network traffic to the most suitable server while the secondary load balancer operates in a “listening mode.”
active-passive
a scheduling protocol that distributes the load based on which devices can handle the load more efficiently.
affinity
a network access control (NAC) agent that is not installed on an endpoint device but is embedded within a microsoft windows active directory domain controller
agentless NAC
the absence of any type of connection between devices.
air gap
A VPN that allows the user to always stay connected instead of connecting and disconnecting from it.
always-on VPN
a monitoring technique used by an intrusion detection system (IDS) that creates a baseline of normal activities and compares actions against the baseline. Whenever there is a significant deviation from this baseline, an alarm is raised.
anomaly monitoring
A defense used to protect against IP spoofing that imitates another computer’s IP address.
antispoofing
A special proxy server that “knows” the application protocols that is supports.
application/multipurpose proxy
a firewall that functions at the OSI application layer
application-based firewall
A monitoring technique used by an intrusion detection system (IDS) that uses the normal processes and actions as the standard and compares actions against it.
behavioral monitoring
A hardware device or software that is used to join two separate computer networks to enable communication between them.
bridge
A system of security tools that is used to recognize and identify data that is critical to the organization and ensure that it is protected.
data loss prevention (DLP)
A separate network that rests outside the secure network perimeter: untrusted outside users can access the DMZ but cannot enter the secure network.
demilitarized zone (DMZ)
A network access control (NAC agent that disappears after reporting information to the NAC device.
dissolvable NAC agent
A private network that can also be accessed by authorized external customers, vendors, and partners.
extranet
the failure to raise an alarm when there is abnormal behavior
false negative
alarm that is raised when there is no actual abnormal behavior.
false positive
hardware or software that is designed to limit the spread of malware.
firewall
A defense against a MAC flooding attack. see also port security.
flood guard
a computer or an application program that intercepts user requests from the from the internal secure network and then processes those requests on behalf of the users.
forward proxy
A VPN technology in which all traffic is sent to the VPN concentrator and is protected.
full tunnel
A separate open network that anyone can access without prior authorization.
guest network