Networking Flashcards
(121 cards)
A technique used to modify the destination IP address of incoming network traffic, often used in load balancing or routing.
Example: An organization uses this to redirect incoming traffic to different internal servers based on the destination IP.
DNAT (Destination Network Address Translation)
A method of subnetting that allows different subnet masks to be used within the same network, providing more efficient IP address allocation.
Example: A company uses this to allocate smaller subnets for different departments, optimizing IP address use.
VLSM (Variable Length Subnet Mask)
A high-performance routing technique that uses labels to direct data packets through a network, improving speed and efficiency, particularly for large-scale networks.
Example: used by service providers to create virtual private networks (VPNs) and ensure faster data transfer across their infrastructure.
MPLS (Multiprotocol Label Switching)
A logical subgroup within a network, created to segment traffic, improve security, and reduce congestion, even if the devices are physically on different switches.
VLAN (Virtual Local Area Network)
A list of permissions attached to an object that defines which users or systems can access that object and what actions they can perform.
ACL (Access Control List)
A security method that requires users to provide two or more verification factors to gain access to a system, enhancing security.
Example: A user logs into their account using a password and then enters a one-time code sent to their phone.
MFA (Multi-Factor Authentication)
A security solution that enforces policies for accessing a network, ensuring that devices meet security standards before being granted access
NAC (Network Access Control)
A set of rules and guidelines that define acceptable use of an organization’s resources, including network, internet, and computer systems.
AUP (Acceptable Use Policy)
A security solution designed to prevent unauthorized access, transfer, or loss of sensitive data by monitoring and controlling data flow.
Example: A file transfer is blocked because it contains sensitive information flagged by monitoring systems.
DLP (Data Loss Prevention)
A network architecture that separates the control plane from the data plane, enabling dynamic and programmatic network configuration.
Example: Traffic is automatically rerouted during peak loads to maintain performance.
SDN (Software-Defined Networking)
A Windows feature that allows individual files or folders to be encrypted to protect sensitive data from unauthorized access.
Example: A document is encrypted, ensuring it remains secure even if accessed by another user.
EFS (Encrypting File System)
A security solution that protects users from web-based threats by filtering malicious traffic, enforcing policies, and monitoring activity.
Example: Access to a harmful website is blocked to prevent exposure to malware.
SWG (Secure Web Gateway)
A security technology that monitors endpoint devices to detect, investigate, and respond to cybersecurity threats in real-time.
Example: Suspicious file activity is identified and flagged for investigation.
EDR (Endpoint Detection and Response)
A physical device used to filter traffic between networks, often placed at the perimeter to protect internal systems from external threats.
Example: A standalone device is installed at the edge of a company’s network to block unauthorized incoming connections.
Hardware Firewall
A software application installed on individual devices to monitor and control network traffic for that specific host.
Example: A device’s firewall blocks a connection attempt from a suspicious program.
Host-Based Firewall
A type of firewall that acts as an intermediary between users and the internet, filtering traffic and preventing direct connections for added security.
Example: Requests to websites are routed through an intermediary to check for malicious content before allowing access.
Proxy Firewall
A firewall deployed to protect an entire network by monitoring and controlling traffic at the network boundary.
Example: Rules are configured to block unauthorized access to sensitive internal servers.
Network-Based Firewall
A firewall deployed to protect an entire network by monitoring and controlling traffic at the network boundary.
Example: Rules are configured to block unauthorized access to sensitive internal servers.
Personal Firewall
A security system that monitors network traffic for suspicious activity or known threats and generates alerts for potential incidents.
Example: Suspicious network activity is detected, and an alert is sent to the security team for review.
NIDS (Network Intrusion Detection System)
A security system that monitors a specific device or host for unusual or malicious activity, such as file changes or unauthorized access.
Example: File integrity changes are flagged on a server after a potential breach attempt.
HIDS (Host Intrusion Detection System)
A security system that actively monitors network traffic and takes action to block or mitigate identified threats.
Example: A threat is detected on the network, and malicious packets are automatically dropped.
NIPS (Network Intrusion Prevention System)
A security system that protects an individual host by detecting and preventing malicious activity on that device.
Example: An attempt to exploit a vulnerability is stopped before it can execute on the machine.
HIPS (Host Intrusion Prevention System)
A contract between a service provider and a customer that defines the level of service expected, including performance metrics, uptime guarantees, and responsibilities.
Example: A document specifies that a cloud provider must maintain 99.9% uptime for hosted applications.
Service Level Agreement (SLA)
A framework that outlines the shared security and operational responsibilities between a cloud provider and the customer.
Example: The provider ensures the physical security of servers, while the customer manages access control for their virtual machines.
Cloud Responsibility Matrix