Defining Network Infrastructures and Network Security

The flashcards below were created by user cmob011 on FreezingBlue Flashcards.

  1. worldwide system of connected computer networks.
  2. enormous system of interlinked hypertext
    documents that can be accessed with a web browser
    World Wide Web (WWW)
  3. an interactive type of web experience compared to the previous version 1.0.
    Web 2.0
  4. a private computer network or single Web site that an organization implements in order to share data with employees around the world.
  5. similar to an intranet except that it is extended to users outside a company,and possibly to entire organizations that are separate from or lateral to the company.
  6. a connection between two or more computers or devices that are not on the same private network
    virtual private network (VPN)
  7. is the more commonly used protocol, but
    it is also the less secure option.
    Point-to-Point Tunneling Protocol (PPTP)
  8. is quickly gaining popularity due to the inclusion
    of IPsec as its security protocol
    Layer 2 Tunneling Protocol (L2TP)
  9. are primarily used to protect one network from another. They are often the first line of defense in network security. There
  10. two types of filtering
    • stateless packet inspection
    • stateful packet inspection (SPI)
  11. also known as pure packet filtering, does not retain memory of packets that have passed through the firewall.
    stateless packet filter
  12. also known as NAT endpoint filtering, filters traffic according to ports(TCP or UDP).
    NAT filtering
  13. supports address and port translation and checks whether the type of application traffic is allowed.
    Application-level gateway (ALG)
  14. works at the session layer of the OSI model when a TCP or UDP connection is established.
    Circuit-level gateway
  15. acts as an intermediary between a LAN and the Internet.
    proxy server
  16. attempts to serve client requests without actually contacting the remote server.
    Caching proxy
  17. secures a network by keeping machines behind it anonymous; it does this through the use of NAT.
    IP proxy
  18. usually applied as software at the application layer and it can filter out various types of Internet activities, such as access to certain Web sites, email, instant messaging, and so on
    Internet content filter,
  19. a type of IDS that attempts to detect malicious
    network activities (e.g., port scans and DoS attacks) by constantly monitoring network
    network intrusion detection system (NIDS)
  20. designed to inspect traffic, and, based on
    its configuration or security policy, it can remove, detain, or redirect malicious traffic in addition to simply detecting it.
    network intrusion prevention system (NIPS)
  21. is a small network that is set up separately
    from a company’s private local area network and the Internet.
    perimeter network or demilitarized zone (DMZ)
  22. This configuration has a DMZ situated between two firewall devices, which could be black box appliances or Microsoft Internet Security and
    Acceleration (ISA) Servers.
    Back-to-back configuration
  23. usually attached to a separate connection of the company firewall.
    3-leg perimeter configuration
Card Set:
Defining Network Infrastructures and Network Security
2014-02-26 11:08:45
Lesson 8
Show Answers: