Networks

 0    16 flashcards    guest3230502
download mp3 print play test yourself
 
Question język polski Answer język polski
Defense in depth
start learning
environment built around multiple controls design to ensure that a failure in a single Control - or even multiple controls is unlikely to cause a security breach
The OSI model
start learning
the Open Systems Interconnection model is used to conceptually describe how devices and software operator together through networks. the OSi model Has 7 layers
Network segmentation
start learning
divides a network up into logical or physical groupings that are frequently based on trust boundaries, functional requirenents, or other reasons that help an organization apply controls or assist with functionality.
VLAN
start learning
Virtual Local Ares Network one of the most knkwn technologu or concept for network segmentation. A VLAN seta up a broadcast domain that is segmented at the Data Link Layer
broadcast domain
start learning
a broadcast domain is a segment of a network in which all devices or Systems can reach one another via packets sent as a broadcast at the Data Link layer
East west
start learning
east west traffic is used to describe the traffic flow in data center (the same security żonę)
NAC
start learning
network Access Control z determines whether a device should be allowed to connect to a network
Port security
start learning
capability that allows to limit the number of MAC addresses that can be used on a single port. this prevents a number of possible problems including MAC (hardware) address spoofing, CAM table overflows, plugging in additional network devices in somecase
CAM table
start learning
The CAM (Content Addressable Memory) table in a network switch is like a phonebook for devices in a network. It keeps track of which device (identified by its MAC address) is connected to which port on the switch.
CAM table overflow
start learning
CAM table overflow occurs when a network switch's Content Addressable Memory (CAM) table reaches its maximum capacity and cannot store any more MAC address/port mappings.
Network loop
start learning
In networking, a "loop" refers to a situation where there are multiple paths between two points in a network, causing packets to continuously circulate without reaching their intended destination.
port mirror
start learning
Sends a copy of all traffic sent to one switch port to another switch port for monitoring
SPAN
start learning
Switch Port Analyzer do the same thing as port mirror but also can combines traffic from multiple ports to a single port for analysis
VPN
start learning
Virtual Private Network is a way to create a virtual network linę across a public network that allows endpoints to act as though they are on the same network
MAC filtering
start learning
allow the WAP the ability to accept or deny connections based on the clients device hardware (to MAC address)
LDAP
start learning
Lightweight Directory Access Protocol- is a protocol that allows user or serivce to acces and modify directory information over a network

You must sign in to write a comment