Network Protection
Firewalls
Backup and Restore
Types of Networks
Port Numbers
100

means any activity to protect against manipulation of your network and your data

What is a network protection?

100

Filters traffic based on the configuration set by the administrator

What is a firewall?

100

These can be used to recover or restore deleted or corrupted data with a copy.

What are backups?

100

A network topology in which each node connects to exactly two other nodes, forming a single continuous pathway to each node

What is a Ring?

100

HyperText Transfer Protocol (HTTP)

What is port 80?

200
A physical or logical sub-network that contains and exposes an organization's external-facing services to a larger and untrusted network, usually the Internet.
What is a Demilitarized Zone (DMZ)?
200

Network level firewalls run at these layers of the OSI model.

What are layer 3 (Network)?

200
This type of backup is the starting point for all other backups, and contains all the data in the folders and files that are selected to be backed up.
What is a full backup?
200

computer network that interconnects computers within a limited area such as a residence, school, laboratory, university campus or office building

What is a Local Area Network (LAN)?

200

Domain Name System (DNS) (TCP and UDP) 

What is port 53?

300

A program or device that controls communication between clients on one side of a firewall and acts like a a server on the other side.

What is a proxy?

300

These firewalls view information as a data stream and not as a series of packets.

What are application-level firewalls?

300
This type of backup processes only files that are new or have changed since the previous backup.
What is an incremental backup?
300

A computer network for interconnecting devices centered on an individual person's work-space.

What is a Personal Area Network (PAN)?

300

used for secure communication over a computer network, and is widely used on the Internet. (HTTPS)

What is port 443?

** (Double points)

400

is a security technique that regulates who or what can view or use resources in a computing environment

What is access control?

400

This is a term used to describe the technology for transmitting voice communications over a data network using open-standards-based-IP.

What is VOIP? Voice Over Internet Protocol

400
This type of backup processes the files that are new or have changed. However, these backups do not update the index file with each task execution.
What is a differential backup?
400

express in binary (IPV4) the number :  1

What is 00000001?

400

 File Transfer Protocol (FTP) (Two)

What is port 20, 21?

500
Occurs when multiple systems flood the bandwidth or resources of a targeted system, usually one or more web servers.
What is a Distributed Denial of Service (DDoS) attack?
500

A firewall that can restrict incoming and outgoing network activity for that host only.

What is a host-based firewall?

500

This is one of the most common causes of data loss.

What is human error?  

500

device (router, firewall, server) that enables traffic to flow in and out of the network

What is a gateway?

500

** Daily Double Name the ports:  

Internet Message Access Protocol (IMAP4) 

Simple Mail Transfer Protocol (SMTP) 

Post Office Protocol (POP3)


What are ports: 143, 25, 110

M
e
n
u