Network Security,chapter 5

Network deficiency

31 cards   |   Total Attempts: 188
  

Cards In This Set

Front Back
Cache
Temporary storage area
Classful addressing
IP addresses that are split between the network and hosp portions set on the boundaries between the bytes
Convergence
Unifying voice and data traffic over a single internet protocol network
Core switches
Switches that reside at the top of the hierarchy and carry traffic between switches
DMZ (demilitarized zone
Separate network that sits outside the secure network perimeter, often used to provide "outside services" such as Web service and e-mail
Honey pot
Server intended to trap or trick attacker
HIPS (host intrusion prevention system)
Intrusion prevention systems that are installed on local systems
Integrated network security hardware
Hardware device that integrates multipurpose security multipurpose security appliances with a traditional network device such as a switch or router
Internet content filters
Technology to monitor internet traffic and block access to preselected Web sites and files
IPS (intrusion prevention system)
System that finds malicious traffic and deals with it immediately
IP telephony
Adding digital voice clients and new voice applications onto the IP network
Multiplexed
Services such as voice, video, and data combined and transported under a universal format
NAC (network access control)
Technology that examines the current state of a system and corrects any deficiencies before it is allowed to connect to the network
NAT (network address translation)
Technology that hides the IP address of network devices from attackers
NIDS (network intrusion detection system)
System to monitor and possibly prevent attempts to attack a local system