Networks

 0    16 fiszek    guest3230502
ściągnij mp3 drukuj graj sprawdź się
 
Pytanie język polski Odpowiedź język polski
Defense in depth
rozpocznij naukę
environment built around multiple controls design to ensure that a failure in a single Control - or even multiple controls is unlikely to cause a security breach
The OSI model
rozpocznij naukę
the Open Systems Interconnection model is used to conceptually describe how devices and software operator together through networks. the OSi model Has 7 layers
Network segmentation
rozpocznij naukę
divides a network up into logical or physical groupings that are frequently based on trust boundaries, functional requirenents, or other reasons that help an organization apply controls or assist with functionality.
VLAN
rozpocznij naukę
Virtual Local Ares Network one of the most knkwn technologu or concept for network segmentation. A VLAN seta up a broadcast domain that is segmented at the Data Link Layer
broadcast domain
rozpocznij naukę
a broadcast domain is a segment of a network in which all devices or Systems can reach one another via packets sent as a broadcast at the Data Link layer
East west
rozpocznij naukę
east west traffic is used to describe the traffic flow in data center (the same security żonę)
NAC
rozpocznij naukę
network Access Control z determines whether a device should be allowed to connect to a network
Port security
rozpocznij naukę
capability that allows to limit the number of MAC addresses that can be used on a single port. this prevents a number of possible problems including MAC (hardware) address spoofing, CAM table overflows, plugging in additional network devices in somecase
CAM table
rozpocznij naukę
The CAM (Content Addressable Memory) table in a network switch is like a phonebook for devices in a network. It keeps track of which device (identified by its MAC address) is connected to which port on the switch.
CAM table overflow
rozpocznij naukę
CAM table overflow occurs when a network switch's Content Addressable Memory (CAM) table reaches its maximum capacity and cannot store any more MAC address/port mappings.
Network loop
rozpocznij naukę
In networking, a "loop" refers to a situation where there are multiple paths between two points in a network, causing packets to continuously circulate without reaching their intended destination.
port mirror
rozpocznij naukę
Sends a copy of all traffic sent to one switch port to another switch port for monitoring
SPAN
rozpocznij naukę
Switch Port Analyzer do the same thing as port mirror but also can combines traffic from multiple ports to a single port for analysis
VPN
rozpocznij naukę
Virtual Private Network is a way to create a virtual network linę across a public network that allows endpoints to act as though they are on the same network
MAC filtering
rozpocznij naukę
allow the WAP the ability to accept or deny connections based on the clients device hardware (to MAC address)
LDAP
rozpocznij naukę
Lightweight Directory Access Protocol- is a protocol that allows user or serivce to acces and modify directory information over a network

Musisz się zalogować, by móc napisać komentarz.