Networking Chapter 13 Terminology

12345678910111213141516171819202122232425262728293031
Across
  1. 7. A collection of components that allow administrators to regulate network access and communication based on a computer's compliance with health requirement policies.
  2. 9. Using more than one method to authenticate users.
  3. 13. This authentication type of authentication uses something users have in their possession. (Type 2, also called token-based)
  4. 16. The processing rate, or system throughput, identifies the number of subjects or authentication attempts that can be validated. An acceptable rate is ten subjects per minute or above.
  5. 18. Use this command on a linux system to change the current user's password.
  6. 20. Traditional OS updates, released the second Tuesday of each month. They usually include security and driver updates.
  7. 21. This authentication type uses where you are accessing the information from. (Type 4)
  8. 23. A MAC address that has been manually identified as an allowed address.
  9. 24. This authentication type uses the unique way you do something.
  10. 27. This is a digital document that identifies a user or a computer. The certificate includes a subject name, which is the name of the user or the computer.
  11. 29. Use this command on a linux system to remove the user from the system.
  12. 30. Formerly known as upgrades, they contain security and quality revisions, feature additions, and changes. They are released semi-annually in the fall and spring.
  13. 31. A MAC address that has been dynamically learned and allowed by the switch. These addresses are only saved in the MAC address table in RAM and are not added to the configuration file.
Down
  1. 1. The connection point for clients into the network (also called an enforcement point). The ES allows or denies network access.
  2. 2. This authentication type requires users to provide a password or some other data that they know. (Type 1)
  3. 3. Kerberos is a free protocol that provides strong authentication for client/server applications using a secret-key cryptography. With Kerberos, the client can prove its identity even across an unsecure network connection.
  4. 4. Updates for other Microsoft products like Office.
  5. 5. Occurs when the maximum number of MAC addresses has been seen on the port and an unknown MAC address is detected.
  6. 6. This authentication type uses a biometric system. A biometric system attempts to identify a person based on metrics or a mathematical representation of the subject's biological attributes. (Type 3)
  7. 8. This is also called the equal error rate, is the point where the number of false positives matches the number of false negatives in a biometric system.
  8. 10. Use this command on a linux system to modify an existing user account.
  9. 11. This is a port-based authentication service where the client initiates the authentication, a network device negotiates the authentication, and an authentication server is accessed after the supplicant is authenticated.
  10. 12. A client that has NAP-aware software, either through the operating system or through other components. Client software generates a Statement of Health (SoH) that reports the client configuration for health requirements.
  11. 14. This is is a web page that pops up when you access public Wi-Fi. This portal usually summarizes terms disclosing types of activities the Wi-Fi provider is not liable for during public access.
  12. 15. Non-Microsoft driver updates that are applicable to users' devices.
  13. 17. A set of resources that a non-compliant computer can access on a limited-access network.
  14. 19. This occurs when a person who should be denied access is allowed access.
  15. 22. Use this command on a linux system to create a user account.
  16. 25. This occurs when a person who should be allowed access is denied access. The false rejection rate (FRR) is a measure of the probability that a false negative will occur.
  17. 26. The server responsible for keeping track of health requirements and verifying that clients meet those requirements before gaining access. A Windows server running the Network Protection Service role is a NAP server.
  18. 28. A MAC address that is manually configured or dynamically learned and saved.