The OSI layer responsible for representing data in a format that can be understood by applications
Presentation Layer
allows remote users to securely access a private network over a public network
a standardized set of rules and procedures for transmitting data over a network
Protocol
a situation where the amount of traffic on a network exceeds its capacity, resulting in slow or delayed transmission of data
Congestion
a security device that monitors and controls network traffic between the network and the internet.
Firewall
Network that provides access to high-speed storage devices such as hard drives and tape libraries
Storage Area Network (SAN)
It is responsible for establishing the encrypted connection to the remote server and providing access to the VPN.
VPN Client
Three parts of a data packet
Header, Payload, Trailer
Helps the receiving device to verify the integrity of the data in the packet and to detect any errors that may have occurred during transmission.
Trailer
These are the hardware components that enable devices to connect to the wireless network
Network Interface Cards (NICs)
It lets network administrators group devices together based on logical connections
Virtual Local Area Network (VLAN)
can reduce costs associated with expensive private networks and leased lines
VPN Cost Savings
What happens at the end of packet switching
Misordered packets are reordered to original form
What is the primary advantage of copper twisted pair cable?
Low Cost
a physical path that directs and confines signals for data transmission
Guided Medium
Though rarely used today, this device lacks intelligence and sends incoming data to all outputs, unlike its more efficient successor.
Hub
the process of encapsulating one protocol within another protocol for secure data transmission over an insecure network
Tunneling
a situation where two or more devices or processes are unable to proceed because they are waiting for each other to release a resource or complete a task
Deadlock
What is the bisection (two types) of compression techniques
Lossless and lossy
a wireless communication technology that uses light, typically from LED bulbs, to transmit data
LiFi
A device that blindly forwards incoming network data to all connected devices, regardless of destination.
Hub
method used to establish and maintain the secure connection between the client and the server
VPN Protocol
interference from one cable to another
Crosstalk
The weakening or loss of signal strength as it travels through a medium
Signal Attenuation
These systems can be used to prevent attacks by blocking suspicious traffic, such as Denial of Service (DoS) attacks.
Intrusion Detection and Prevention Systems