Term
Serve as a gateway between a trusted and untrusted network that gives limited, authorized access to untrusted hosts. |
|
Definition
|
|
Term
Layer 2 devices that filter traffic between segments based on Media Access Control (MAC) addresses. |
|
Definition
|
|
Term
Sublayer that provides services for the application layer and request services from the session layer |
|
Definition
Common application service element (CASE) |
|
|
Term
Multiplex connected devices into one signal to be transmitted on a network |
|
Definition
|
|
Term
A wireless technology that spreads a transmission over a much larger frequency band, and with corresponding smaller amplitude |
|
Definition
Direct-Sequence Spread Spectrum (DSSS) |
|
|
Term
The process of transforming encrypted data back into its original form, so it can be understood. |
|
Definition
|
|
Term
A lightweight encapsulation protocol and lacks the reliable data transport of the TCP layer |
|
Definition
Fibre Channel over Ethernet (FCoE) |
|
|
Term
A stateful protocol that requires two communication channels |
|
Definition
File Transfer Protocol (FTP) |
|
|
Term
Devices that enforce administrative security policies by filtering incoming traffic based on a set of rules |
|
Definition
|
|
Term
This wireless technology spreads its signal over rapidly changing frequencies |
|
Definition
Frequency-Hopping Spread Spectrum (FHSS) |
|
|
Term
Provides a means to send error messages for non-transient error conditions and provides a way to probe the network in order to determine general characteristics about the network. |
|
Definition
Internet Control Message Protocol (ICMP) |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
A client/server-based directory query protocol loosely based upon X.500, commonly used for managing user information |
|
Definition
Lightweight Directory Access Protocol (LDAP) |
|
|
Term
Allow users remote access to a network via analog phone lines |
|
Definition
|
|
Term
Layering model structured into seven layers (physical layer, data-link layer, network layer, transport layer, session layer, presentation layer, application layer) |
|
Definition
|
|
Term
A basic network mapping technique that helps narrow the scope of an attack |
|
Definition
|
|
Term
Involves a pair of keys-a public key and a private key-associated with an entity that needs to authenticate its identity electronically or to sign or encrypt data |
|
Definition
|
|
Term
An authentication protocol used mainly in networked environments, such as ISPs, or for similar services requiring single sign-on for layer 3 network access, for scalable authentication combined with an acceptable degree of security. |
|
Definition
Remote Authentication Dial-in User Service (RADIUS) |
|
|
Term
Represent the ability to allow for the executing of objects across hosts |
|
Definition
Remote Procedure Calls (RPC) |
|
|
Term
A program which can extract data from output on a display intended for a human |
|
Definition
|
|
Term
The first line of protection between trusted and untrusted networks |
|
Definition
|
|
Term
Sublayer that provides application specific services (protocols) |
|
Definition
Specific application service element (SASE) |
|
|
Term
A method commonly used to modulate information into manageable bits that are sent over the air wirelessly |
|
Definition
|
|
Term
Layering model structured into four layers (link layer, network layer, transport layer, application layer) |
|
Definition
TCP/IP or Department of Defense (DoD) model |
|
|
Term
A diagnostic tool that displays the path a packet traverses between a source and destination host |
|
Definition
|
|
Term
Provides connection-oriented data management and reliable data transfer |
|
Definition
Transmission Control Protocol (TCP) |
|
|
Term
Provides a lightweight service for connectionless data transfer without error detection and correction |
|
Definition
User Datagram Protocol (UDP) |
|
|
Term
An encrypted tunnel between two hosts that allows them to securely communicate over an untrusted network |
|
Definition
Virtual Private Network (VPN) |
|
|
Term
A technology that allows you to make voice calls using a broadband Internet connection instead of a regular (or analog) phone line |
|
Definition
Voice over Internet Protocol (VoIP) |
|
|
Term
Links two or more devices over a short distance using a wireless distribution method, usually providing a connection through an access point for Internet access. |
|
Definition
Wireless local area network (WLAN) |
|
|
Term
A wireless network made up of radio nodes organized in a mesh topology |
|
Definition
|
|
Term
A type of wireless network that connects several wireless LANs |
|
Definition
Wireless metropolitan area networks |
|
|
Term
A type of wireless network that connects several wireless LANs |
|
Definition
Wireless metropolitan area networks |
|
|
Term
Interconnect devices within a relatively small area that is generally within a person's reach |
|
Definition
Wireless personal area networks (WPANs) |
|
|