Front | Back |
A high-speed network link connecting network segments.
|
Backbone
|
Ethernet standard run over shielded or unshielded twisted-pair cable.
|
Base-T
|
Ethernet standards run over fiber optic cable.
|
Base- R
|
Ethernet standards run over shielded copper twisted pair- cable.
|
Base-C
|
Positive identification of entity, either a person or a system, that wants to access information or services that have been secured.
|
Authentication
|
A method of authentication that uses a person's physical trait-such as a fingerprint, retinal scan, or voice print-to secure an account or resource.
|
Biometrics
|
A computer that stands outside te protected network and defends it by using two network cards: one for the DMZ and one for the intranet. Network communication isn't allowed between the two network cards in the bastion host server
|
Bastion host
|
A TP cable with one end wired using 568A and the other using 568B, allowing you to directly connect two computers.
|
Crossover cable
|
Interference caused by an alternating electrical current flowing through a wire and creating an electromagnectic field that affects the current flow in any adjacent cable.
|
Crosstalk
|
A server that maintains a database, or repository, of certificates.
|
CS (Certificate Server)
|
A device used to verify an electrical connection between two points.
|
Continuity Tester
|
An area between the private network (intranet) and a public network (extranet) such as the internet.
|
DMZ (Demilitarized zone)
|
A service used to resolved host names to IP addresses, find domain controllers and find resources on the internet, such as Web Servers and e-mail Servers.
|
DNS (Domain Name System)
|
An attack that consumes or disables resources so that services to users are interrupted.
|
DOS (Denial of service) attack
|
A window logging utility.
|
Event Viewer
|