This network security device monitors and analyzes network traffic for signs of malicious activity
Intrusion detection system (IDS)
This device operates at the OSI Network layer and forwards data packets between different networks?
Router
This protocol is commonly used to secure communication over a network by encrypting the data transmitted between a client and a server
What is SSH?
This network device acts as a gateway between a private internal network and the public internet, filtering and controlling network traffic based on predefined security rules?
What is a Firewall?
This is the primary function of a firewall in network security
Blocking unauthorized access to or from a private network
This is the primary function of a Layer 2 switch in a network
What is forwarding data based on MAC addresses
This is the primary purpose of the Transport Layer Security (TLS) protocol
What is encrypting data?
This type of network security device encrypts data and masks the user's IP address, creating a secure tunnel for communication over a public network?
What is a VPN?
This is a secure protocol that encrypts data sent across public networks
HTTPS
This protocol is commonly used for secure remote access to network devices
What is SSH?
This is the protocol used for securely sending emails
S/MIME
This network device forwards data between different networks, using IP addresses to route traffic between separate local area networks (LANs)
What is a Router?
This is what a network segmentation helps achieve in a cybersecurity context
Limits the spread of malware and unauthorized access
To segment a network into smaller, logical subnets
What is the purpose of a VLAN in a network?
This is the primary function of the Internet Protocol Security (IPsec) suite
To secure Internet Protocol (IP) communications by authenticating and encrypting each IP packet in a communication session
This network device is responsible for connecting multiple devices within the same network, allowing them to communicate with each other
What is a switch?
This security principle involves granting users only the access necessary to perform their job functions
Least Privilege
This device is used to connect different VLANs and allow communication between them
What is a Router
This protocol is used to securely manage network devices over an unsecured network
What is SNMPv3?
This is a person who loves pulling a fire alarm, but can't because they are 18
Who is Dominic Harbin?