| A | B |
| VLan, subnetting | isolate sensitive traffic |
| Convergence | integration of voice and data |
| DMZ | separate network outside perimiter |
| NAT( Network Address Translation) | hides IP address of internal devices |
| NAC(Network Access Control) | prevents insecure networks from connecting |
| packet filter/firewall | prevents malicious data from entering |
| Stateful | won't allow packet not requested |
| Rule base | sets up actions to be taken on packets |
| proxy server | substitutes its IP for clients |
| honey pot | decoy to mislead hackers |
| reverse proxy | routes packets to correct server |
| NIDS( Network Intrusion Detection Sys.) | monitors network for attacks and alerts or protects |
| NIPS(Network Intrusion Prevention Sys.) | takes advanced steps if attack detected |
| Content filter | blocks restricted sites |
| Integrated Network Security Hardware | lets devices like routers and switches work with security appliances |
| classful addressing | IP split on boundaries between bytes |
| Cache | temporary storage area |
| core switch | carry traffic between switches |
| IP telephony | voice applications over IP |
| multiplex | voice, video, data transported under universal format |
| out-of-band | using separate data stream |
| PAT(Port address translatiion) | assigns a different TCP port to each packet |
| Private address | used by internal network client |
| Production honeypot | captures limited info regarding attacks on honeypot |
| research honeypot | used by networks needing high security,ie- military |
| stateless packet filtering | denies packets only based on rules |
| subnetting | dividing IP at any point in 32 bits |
| system call | interruts program, requests service from OS |
| VoIP | voice traffic on IP network |
| workgroup switches | connected directly to device on network |