Mod 6 Key Terms
Across
- 5. (13,4) A firewall design where there is typically one inside interface connected to the private network, one outside interface connected to the public network, and one DMZ interface.
- 7. is software installed on a host to monitor and analyze suspicious activity.
- 8. has no Impact on network (latency, jitter); Correct tuning required for response actions; More vulnerable to network security evasion techniques
- 9. (6,7) When certain events occur on a network, networking devices have trusted mechanisms to notify the administrator with detailed system messages.
- 11. a firewall provide stateful packet filtering by using connection information maintained in a state table. It analyzes traffic at OSI Layer 3 through 5.
- 13. (3,8,9) Protects the network by automatically blocking risky sites and testing unknown sites before allowing users to access them; Provides malware protection, application visibility and control, acceptable use policy controls, insightful reporting, and secure mobility
- 14. is an important protocol to synchronize the time across all devices on the network. When the time is not synchronized between devices, it will be impossible to determine the order of the events
- 15. is a private network that is created over a public network, usually the internet; connects two endpoints, such as a remote office to a central office, over a public network, to form a logical connection.
Down
- 1. 'Packet filtering firewalls' are usually part of a router firewall, which permits or denies traffic based on Layer 3 and Layer 4 information.
- 2. (6,7,4) is a series of commands that control whether a device forwards or drops packets based on information found in the packet header
- 3. is a framework for configuring user authentication, authorization, and accounting services; typically uses a TACACS+ or RADIUS server for this purpose.
- 4. is a system, or group of systems, that enforces an access control policy between networks.
- 6. Stops trigger packets; Some impact on network (latency, jitter); Sensor issues might affect network traffic.
- 10. (5,8,9) Defends mission-critical email systems; Constantly updated by real-time feeds from the systems like Cisco Talos
- 12. Protocol which allows administrators to manage end devices such as servers, workstations, routers, switches, and security appliances, on an IP network.