Question

A. Multilayer switch An encrypted tunnel across an unsecured infrastructure. A piece of software or a non-inline device that detects suspicious activity, logs B. Broadcast domain the action, sends an alert, and can even notify another device to take corrective action. C. PuITY D. Client/server E. Peer-to-peer A switch that operates at both Layer 2 and Layer 3 of the OSI model. A group of computers that receive each others broadcast A VPN protocol that has clients connect to the VPN server using a standard messages Web browser. F. VPN A virtual network that allows hosts to belong to the same network ID, even if they are connected to different network switches that are in different geographi locations. hical G. IPsec A network that has a dedicated server sharing resources and clients that connect An inline piece of software or a device that detects suspicious activity and Delaying some or all packets, to bring them into compliance with a desired A VPN protocol that used to be used with L2TP VPNs, but now is a complete A network in which all systems act as both clients and servers. to that server to access those resources. H. SSL then takes corrective action itself. I. VLAN traffic profile. It is a form of rate limiting J. Traffic shaping VPN solution by itself. K. IDS L. IPS A popular SSH client, Telnet client, and terminal emulator.

A. Multilayer switch An encrypted tunnel across an unsecured infrastructure. 

B. Broadcast domain A piece of software or a non-inline device that detects suspicious activity, logs the action, sends an alert, and can even notify another device to take corrective action. 

C. PuITY A switch that operates at both Layer 2 and Layer 3 of the OSI model.

D. Client/server  A group of computers that receive each other's broadcast messages.

E. Peer-to-peer A VPN protocol that has clients connect to the VPN server using a standard messages Web browser. 

F. VPN A virtual network that allows hosts to belong to the same network ID, even if they are connected to different network switches that are in different geographi locations. 

G. IPsec A network that has a dedicated server sharing resources and clients that connect to that server to access those resources.              

H. SSL An inline piece of software or a device that detects suspicious activity and then takes corrective action itself. 

I. VLAN Delaying some or all packets, to bring them into compliance with a desired traffic profile. It is a form of rate limiting 

J. Traffic shaping A VPN protocol that used to be used with L2TP VPNs, but now is a complete VPN solution by itself. 

K. IDS A network in which all systems act as both clients and servers. 

L. IPS A popular SSH client, Telnet client, and terminal emulator.

0 0
Add a comment Improve this question Transcribed image text
✔ Recommended Answer
Answer #2
  1. Multilayer Switch

A switch that operates at Layer 2 and Layer 3 of the OSI model.

Explanation :

A multilayer switch is a networking device that provides additional functionalities over a routed network. It works on the OSI layer’s 2 and 3.

  1. Broadcast Domain

A group of computers that receive each other’s broadcast messages.

Explanation :

A broadcast domain is a network of interconnected systems that are able to receive each other’s messages that are being broadcasted.

  1. PuTTY

A popular SSH client, Telnet client, and a terminal emulator.

Explanation :

PuTTY is a open source or free Secure shell and Telnet client used for the platforms like windows and Unix operating systems.

  1. Client/Server

A network in which all systems act as both client and server.

Explanation :

This refers to a system in which the system can act as client as well as server depending upon its role at a time.

  1. Peer-to-peer

A network that has a dedicated server sharing resources and clients that connect to that server to access these resources.

Explanation :

It refers to a distributed architecture under which various peers or clients and servers are connected with each other via the network.

  1. VPN

An encrypted tunnel across an unsecured infrastructure.

Explanation :

VPN refers to ‘virtual private network’ and is used to secure the traffic. It sends the data to the destination through an encrypted tunnel in order to secure it.

  1. IPsec

A VPN protocol that is used with L2TP VPN’s but now is a complete VPN solution by itself.

Explanation :

IPsec is an IETF protocol suite which is used to provide authentication, confidentiality, encryption and integrity between two points of communication over a network.

  1. SSL

A VPN protocol that has clients connect to the VPN server using a standard web browser.

Explanation :        

SSL refers to ‘secure socket layer’ . It is a security technology mechanism that id used to provide an encrypted link between the client side and the server side. This is done by connecting the clients on the network to a VPN by using any standard browser for web.

  1. VLAN

A virtual network that allows hosts to belong to the same network ID even if they are not located on the same network switch .

Explanation :        

VLAN refers to ‘virtual local area network’ which is basically a group of hosts that have same network Id even if they are not connected directed with the switch of same network.

  1. Traffic shaping

Delaying some or all packets to bring them into compliance with a desired traffic profile. It is a form of rate limiting.

Explanation :

It can be also termed as ‘packet shaping’ and is a process that is used to monitor and control the incoming and outgoing traffic to and from the network.

  1. IDS

a piece of software or a non-inline device that detects suspicious activity , logs the action, sends an alert and can even notify another device to take corrective action.

Explanation :

It refers to ‘Intrusion detection system’. It a software that is used to detect the presence of any malicious code or activity.

  1. IPS

A piece of software or a device that detects suspicious activity and then takes corrective action.

Explanation :

It refers to ‘Intrusion prevention system’. It is used to alert system about any detected suspicious activity or traffic.

Add a comment
Answer #1

A. Multilayer Switch ---- A switch that operates at Layer 2 and Layer 3 of the OSI model.

B. Broadcast Domain ----- A group of computers that receive each other’s broadcast messages

C. puTTY ---- A popular SSH client,Telnet client, and a terminal emulator.

D. Client/Server ----A network in which all systems act as client and server.

E. Peer-to-peer ---- An encrypted tunnel across an unsecured network

F. VPN---- A network that has a dedicated server sharing resources and clients that connect to that server to access these resources

G. IPsec ---- A VPN protocol that uses Microsoft Point-to-Point Encryption (MPPE) to encrypt data.

H. SSL-----A VPN protocol that uses IPSec for authentication and encryption

I. VLAN ------A virtual network that allows hosts to belong to the same network ID even if they are not located on the same network switch

J. Traffic shaping -----Controlling the flow of packets into or out from the network according to the type of packet

K. IDS ---- a piece of software or a non inline device that detects suspicious activity , logs the action,sends an alert and can even notify another device to take corrective action

L. IPS ----A piece of software or a device that detects suspicious activity and then takes corrective action

Do ask if any doubt. Please upvote.

Add a comment
Answer #3

A. VPN - An encrypted tunnel across an unsecured infrastructure.


B. IDS - A piece of software or a non-inline device that detects suspicious activity, logs the action, sends an alert, and can even notify another device to take corrective action.


C. Multilayer switch - A switch that operates at both Layer 2 and 3 of the OSI model.


D. Broadcast domain - A group of computers that receive each other’s broadcast messages.


E. SSL -  A VPN protocol that has clients connect to the VPN server using a standard web browser.


F. VLAN - A virtual network that allows hosts to belong to the same network ID even if they are connected to different network switches that are in different geographical locations.


G. Client/server - A network that has a dedicated server sharing resources and clients that connect to that server to access those resources.


H. IPS - An inline piece of software or a device that detects suspicious activity and then takes corrective action itself


I. Traffic shaping - Delaying some or all packets to bring them into compliance with a desired traffic profile. It is a form of rate limiting.

J. IPsec - A VPN protocol that is used to be used with L2TP VPN’s but now is a complete VPN solution by itself.


K. Peer-to-peer - A network in which all systems act as both clients and servers.


L. puTTY - A popular SSH client, Telnet client, and a terminal emulator.


Add a comment
Know the answer?
Add Answer to:
A. Multilayer switch An encrypted tunnel across an unsecured infrastructure. A piece of software or a...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
Active Questions
ADVERTISEMENT