Network Security Foundations and Secure Management Flashcards
(76 cards)
A hardware component within a device that provides network access capabilities
Network Interface Card (NIC)
Layer 2 communication device (within a LAN)
Switch
Layer 3 communication device that interconnects two or more LANs
Router
Hardware or software that filters traffic
Firewall
A node on a computer that serves as a source or a destination point
End Device
A device that provides a wireless network connection (WLAN)
Access Point
______, _____, ______ & _______are intermediary devices that connect end devices to the network and control data flow
Switches, routers, firewalls, and access points
guides traffic to its destination network by Layer 3 devices
Routing Process
These devices use __________ to determine the best path and forward packets to the next hop on the way to their destination
routing tables
boosts IP addressing efficiency by splitting networks, distributing traffic, and enhancing security policy distributions.
Subnetting
VLANs in administrative networks key roles:
- Divide large networks
- Isolate traffic securely
- Decrease the network resources wasted
when broadcasting is used - Ensure controlled communication outside
the VLAN
ACLs are essential for _____ and _____ traffic management
Secure
Efficient
filter traffic based on criteria like addresses, protocols, and ports. They are manually configured to allow or block traffic using permit or deny statements
Access-control lists (ACLs)
statements within the ACLs that are inspected upon packet arrival. When the conditions within the ACE are met, the traffic is either allowed or blocked based on the rules configured in the ACE
Access control entries (ACEs)
______ manage network resources, respond to client requests, and host various services. They are dedicated to their intended function.
Servers
Server Types:
- Web
- Database
- Communication
- Application
Host web pages
Web
Stores user or computer-related data
Database
Enables email communication among clients
Facilitates communication among devices and networks
Communication
Enables users to run applications on the web without installing them
Application
________ in a network ensures reliability by creating backup pathways or components
Redundancy
Redundancy can be achieved ______ (duplicate hardware) or ______ (backup routes)
Physically
Logically
allow multiple routers in a subnet mask to share a virtual IP address which can be assigned as a default gateway for end devices. This ensures connectivity if a gateway router fails
Redundancy Protocols