Networking and Security Fundamentals Flashcards Preview

Networking and Security Fundamentals > Networking and Security Fundamentals > Flashcards

Flashcards in Networking and Security Fundamentals Deck (32)
Loading flashcards...
1

Authentication Server

A server or server role that determines whether or not access credentials supplied by a user should enable them to access resources.

2

Bridge

A software-based network device that has the same functionality as a switch.

3

Client/Server Network

A network in which some computers act as servers to provide special services for other client computers.

4

File Server

A computer that stores programs and files that are intended to be shared among network users.

5

IDS (Intrusion Detection System)

Software or hardware, or a combination of both, that scans, audits and monitors the security infrastructure for signs of attacks in progress and automates the intrusion detection process.

6

Internet Appliance

A relatively inexpensive PC that enables Internet access and a specific activity.

7

LAN (Local Area Network)

A self-contained network that spans a small area, such as a single building, floor or room.

8

Least Privilege

The principle that establishes that users and software should only have the minimal level of access that is necessary for them to perform the duties required of them.

9

Mail Server

A computer that stores incoming email messages and forwards outgoing email messages.

10

Malware

Any unwanted software that has the potential to damage a system, impede performance or create a nuisance condition.

11

MAN (Metropolitan Area Network)

A network that covers an area equivalent to a city or other municipality.

12

Modem

A device that converts digital data to an analogue signal that can be sent over a telephone line.

13

Multi-factor Authentication

Any authentication scheme that requires validation of at least two of the possible authentication factors.

14

Mutual Authentication

A security mechanism that requires that each party in a communication verifies its identity.

15

Network

A group of computers that are connected together to communicate and share resources.

16

PAN (Personal Area Network)

A network of devices used by a single individual.

17

Peer-to-peer Network

A network in which resource sharing, processing and communications control are completely decentralised.

18

Print Server

A computer that enables network users to share printers.

19

Proxy Server

A computer or application that isolates internal clients from external servers by downloading and storing files on behalf of the clients.

20

Rapid Elasticity

A cloud computing feature that provides seamless, scalable provisioning.

21

Router

A networking device that connects multiple networks that use the same protocol.

22

RSA Token

A small device that includes cryptographic keys, a digital signature or even biometric information that is verified against an identification system to allow or deny access to a physical location system, or network location.

23

Security Policy

A formalised statement that defines how security will be implemented within a particular organisation.

24

Server

A computer that provides services and resources on the network.

25

Strong Password

A password that meets the complexity requirements that are set by a system administrator and documented in a security policy or a password policy.

26

Switch

A smart network hardware device that joins multiple network segments together.

27

Token

A physical or virtual object that stores authentication information.

28

UTM (Unified Threat Management)

The concept of combining the features of a firewall, gateway antivirus and IDS/IPS into a single device.

29

VPN (Virtual Private Network)

A private network that protects communications sent through a public network such as the Internet.

30

WAN (Wide Area Network)

A network that spans multiple geographic locations, connecting multiple LANs using long-range transmission media.