4a. Network Protection
5a. Firewalls
5b. Backup and Restore
5c. ACL and Proxy Functions
5d. Web Proxies
100
A segment of an internal network that is defined by common security policies.
What is a network enclave?
100
IP Firewalls are typically grouped into these two categories:
What are personal/small office home office (SOHO), and corporate/enterprise.
100
These can be used to recover deleted or corrupted data with a clean copy.
What are backups?
100
These provide logical segmentation of a switch into separate domains.
What is a Virtual Local Area Network (VLAN)?
100
This is located near the web server and acts as an intermediary between a web server and the internet.
What is a reverse proxy?
200
A physical or logical sub-network that contains and exposes an organization's external-facing services to a larger and untrusted network, usually the Internet.
What is a Demilitarized Zone (DMZ)?
200
Network level firewalls run at these layers of the OSI model.
What are layer 3 (Network) and sometimes layer 4 (Transport)?
200
This type of backup is the starting point for all other backups, and contains all the data in the folders and files that are selected to be backed up.
What is a full backup?
200
This type of ACL is used to restrict the packets allowed into a given port.
What is a Port Access Control List (PACL)?
200
In addition to keeping machines behind it anonymous, proxy servers can also speed up access to a resource through this.
What is caching?
300
A program or device that controls communication between clients on one side of a firewall and a server on the other side.
What is a proxy?
300
These firewalls view information as a data stream and not as a series of packets.
What are application-level firewalls?
300
This type of backup processes only files that are new or have changed since the previous backup.
What is an incremental backup?
300
This is a filter that includes pattern matches that determine which packets the filter recognizes, as well as actions the filter takes when it recognizes a packet.
What is an IP filter?
300
These are the two basic types of proxies.
What are software-based and appliance proxies?
400
Provides the capability to control the number of application sessions while preserving access to the base network.
What is access preservation?
400
This is a term used to describe the technology for transmitting voice communications over a data network using open-standards-based-IP.
What is IP telephony?
400
This type of backup processes the files that are new or have changed. However, these backups do not update the index file with each task execution.
What is a differential backup?
400
Most proxy connections you configure on a firewall will typically be outbound, also known as this type of proxy direction.
What is internal burb to external burb?
400
This type of proxy is located near the user/client and acts as an intermediary between a client and a content server to protect the client's IP address from being seen from the internet.
What is a forward proxy?
500
Occurs when multiple systems flood the bandwidth or resources of a targeted system, usually one or more web servers.
What is a Distributed Denial of Service (DDoS) attack?
500
A piece of software running on a single host that can restrict incoming and outgoing network activity for that host only.
What is a host-based firewall?
500
This is one of the most common causes of data loss.
What is physical failure of the media data is stored on?
500
Each connection in the proxy uses this to send and receive data.
What is a socket?
500
This term is used to describe the recency of cached information.
What is freshness?
M
e
n
u