Term
What is the riskiest network zone? |
|
Definition
|
|
Term
What is the safest network zone? |
|
Definition
|
|
Term
What networks can be set up between the Internet and intranets? |
|
Definition
Perimeter networks as buffer zones |
|
|
Term
Term: Robot network; infected computers with malware join this and become a clone/zombie |
|
Definition
|
|
Term
The Internet is __/__-based |
|
Definition
|
|
Term
The ___ travels over the Internet |
|
Definition
|
|
Term
An intranet is basically a ___ |
|
Definition
|
|
Term
What are the private IP address ranges? |
|
Definition
10.0.0.1 - 10.255.255.254 172.16.0.1 - 172.31.255.254 192.168.1.1 - 192.168.255.254 |
|
|
Term
Term: Translates private IP addresses to public IP addresses and vice versa |
|
Definition
Network Address Translation (NAT) |
|
|
Term
What are the benefits of NAT? |
|
Definition
-Hides internal computers -Reduces costs (of IP addresses) -Extended IPv4 lifetime |
|
|
Term
Term: Acts on behalf of the client computers in the internal network to retrieve web content from the internet |
|
Definition
|
|
Term
True/False: You can use a proxy server or NAT to protect a client computer |
|
Definition
False; Proxy servers often include NAT |
|
|
Term
What are the three benefits of a proxy server? |
|
Definition
1. Caching 2. Filtering 3. Content checking |
|
|
Term
Term: Saving copies of requested items for future requests |
|
Definition
|
|
Term
How does the process of a proxy server work? |
|
Definition
1.Info request to proxy server. If site not on block list...
2. Server checks for malicious content. If valid...
3. Site is stored in cache |
|
|
Term
Term: Firewall that filters packets based on IP addresses, ports, and some protocols |
|
Definition
Packet-filtering firewall |
|
|
Term
Term: Traffic is filtered based on state of network connections (known or unknown) |
|
Definition
|
|
Term
Term: Traffic is blocked based on content |
|
Definition
|
|
Term
Term: Traffic is filtered based on an application or service |
|
Definition
Application layer filtering |
|
|
Term
Term: All traffic that hasn't been explicitly allowed is blocked |
|
Definition
|
|
Term
Term: Area between intranet and Internet that host servers accessible from the Internet |
|
Definition
|
|
Term
Term: Additional server in perimeter network that isolates web servers from direct access on the Internet |
|
Definition
|
|
Term
Term: Type of perimeter network used by larger organizations that acts as an isolated portion of the internal network that guests can use |
|
Definition
|
|
Term
Term: Area between the Internet and an intranet that hosts resources for trusted entities via the Internet |
|
Definition
|
|
Term
True/False: An extranet is only different from a perimeter network based on the intent |
|
Definition
|
|
Term
What protects the intranet? |
|
Definition
Network Address Translation (NAT) |
|
|
Term
What can be used to hide a computer's track? |
|
Definition
|
|
Term
Term: Software or hardware that protects your computer |
|
Definition
|
|
Term
Term: Type of rule that protects against incoming traffic |
|
Definition
|
|
Term
Term: Computer's personal website |
|
Definition
Internet Information Services (IIS) |
|
|
Term
Another name for a perimeter network is __. |
|
Definition
De-Militarized Zone (DMZ) |
|
|