Busy. Please wait.
or

show password
Forgot Password?

Don't have an account?  Sign up 
or

Username is available taken
show password

why


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
We do not share your email address with others. It is only used to allow you to reset your password. For details read our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

Remove Ads
Don't know
Know
remaining cards
Save
0:01
To flip the current card, click it or press the Spacebar key.  To move the current card to one of the three colored boxes, click on the box.  You may also press the UP ARROW key to move the card to the "Know" box, the DOWN ARROW key to move the card to the "Don't know" box, or the RIGHT ARROW key to move the card to the Remaining box.  You may also click on the card displayed in any of the three boxes to bring that card back to the center.

Pass complete!

"Know" box contains:
Time elapsed:
Retries:
restart all cards




share
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

Network Fundamentals

Lesson Eight - MTA Exam 90-366

TermDefinition
3-leg perimeter configuration A configuration whereby the DMZ is usually attached to a separate connection of the company firewall. Therefore, the firewall has three connections—one to the company LAN, one to the DMZ, and one to the Internet.
application-level gateway (ALG) A firewall technology that supports address and port translation and checks whether the type of application traffic is allowed
back-to-back configuration A configuration that has a DMZ situated between two firewall devices, which could be black box appliances or Microsoft Internet Security and Acceleration (ISA) Servers.
caching proxy A server or device that tries to serve client requests without actually contacting the remote server.
circuit-level gateway Technology used within a firewall that, once the connection has been made, packets can flow between the hosts without further checking. Circuit-level gateways hide information about the private network, but they do not filter individual packets.
demilitarized zone (DMZ) A small network that is set up separately from a company’s private local area network and the Internet. Also known as a perimeter network.
extranet Similar to an intranet except that it is extended to users outside a company and possibly to entire organizations that are separate from or lateral to the company.
Firewalls A device or server that is primarily used to protect one network from another.
Internet content filter Technology that can filter out various types of Internet activities, such as access to certain Web sites, email, instant messaging, and so on.
Internet Engineering Task Force (IETF) An organization that develops and promotes Internet standards.
Intranet A private computer network or single Web site that an organization implements in order to share data with employees around the world.
IP proxy Technology that secures a network by keeping machines behind it anonymous; it does this through the use of NAT.
Layer 2 Tunneling Protocol (L2TP) VPN technology that has quickly gaining popularity due to the inclusion of IPSec as its security protocol.
NAT filtering that can filter traffic according to ports (TCP and UDP).
network intrusion detection system (NIDS) A device that can detect malicious network activities (e.g., port scans and DoS attacks) by constantly monitoring network traffic. The NIDS will then report any issues that it finds to a network administrator as long as it is configured properly.
network intrusion prevention system (NIPS) A device designed to inspect traffic, and, based on its configuration or security policy, it can remove, detain, or redirect malicious traffic in addition to simply detecting it.
packet filtering A type of firewall that inspects each packet that passes through the firewall and accepts or rejects it based on a set of rules such as IP addresses and ports.
perimeter network A small network that is set up separately from a company’s private local area network and the Internet. Also known as a DMZ.
Point-to-Point Tunneling Protocol (PPTP) A commonly used VPN protocol, which is less secure then L2TP with IPsec.
stateful packet inspection (SPI) Technology used in today’s firewalls that keeps track of the state of network connections by examining the header in each packet. It should be able to distinguish between legitimate and illegitimate packets.
virtual private network (VPN) A connection between two or more computers or devices that are not on the same private network.
Web 2.0 An interactive type of web experience compared to the previous version 1.0. Web 2.0 allows users to interact with each other and act as contributors to Web sites as well.
World Wide Web (WWW) An enormous system of interlinked hypertext documents that can be accessed with a web browser.
Created by: ctrader