This network security device monitors and controls incoming and outgoing traffic based on predefined security rules.
What is a firewall
This type of cloud model combines both public and private cloud environments to offer flexibility and scalability.
What is a Hybrid Cloud
This Networking approach separates the control plane from the data plane, allowing centralized management of network traffic.
What is Software-Defined Networking (SDN)
This data center topology eliminates loops and ensures predictable latency.
What is Spine and Leaf Topology
This cloud-native security framework integrates networking and security functions.
This type of security system passively monitors network traffic for suspicious activity but does not take direct action.
Intrusion Detection System (IDS)
This technology allows network functions, such as firewalls and load balancers, to run on virtual machines instead of dedicated hardware.
What is Network Functions Virtualization (NFV)
This technology optimizes wide-area network performance by dynamically routing traffic based on real-time conditions.
What is Software-Defined Wide Area Networking (SD-WAN)
This type of network provides high-speed access to storage devices for servers.
What is a Storage Area Network (SAN)
This protocol extends Layer 2 networks over Layer 3 infrastructure.
What is Virtual Extensible LAN (VXLAN)
This device distributes network traffic across multiple servers to improve performance and reliability.
This cloud security feature consists of rules that control inbound and outbound traffic to network interfaces, VMs, or subnets.
What are Network Security Groups (NSGs)
This type of networking relies on virtualized infrastructure hosted by third-party providers instead of traditional on-premises hardware.
What is Cloud Networking
This protocol is commonly used in SANs for high speed data transfer.
What is Fibre Channel (FC)
This approach automates network infrastructure deployment using code.
What is Infrastructure as Code (IaC)
This intermediary server acts as a gateway between users and the internet, often used for security and caching purposes.
What is a proxy server
This type of cloud connection provides a dedicated, private link between an organization's on-premises network and a cloud provider.
What is a Direct Connect
This security model assumes that no user or device should be trusted by default, requiring continuous verification.
What is Zero Trust Architecture
This technology extends NVMe performance over network fabrics like Fibre Channel.
This technology automates network configuration and management using scripts and APIs.
What is Network Automation
This specialized network device manages multiple secure remote connections using encryption protocols.
What is a VPN concentrator
This cloud service model provides virtual machines, storage, and networking resources on a pay-as-you-go basis.
What is Infrastructure as a Service (IaaS)
This computing paradigm processes data closer to the source rather than relying on centralized cloud servers.
What is Edge Computing
Traffic between clients and a data center is referred to as this.
What is North-South Traffic
This cloud networking model provides an isolated environment within a public cloud.
What is a Virtual Private Cloud (VPC)