router - operates at the network layer of the OSI model, directing data packets between different networks based on IP addresses., switch - operates at the data link layer of the OSI model, forwarding data based on MAC addresses., Firewall - is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules., Intrusion detection system (IDS) - can detect malicious network activity. Uses signature identification techniques like antimalware. Additionally, can detect malicious activity based on anomalous behavior, Intrusion prevention system (IPS) - is used to actively drop packets or connections that are identified as malicious., Load balancer - distributes incoming network traffic across multiple servers to ensure no single server becomes overwhelmed, improving the reliability and availability of applications., Proxy - acts as an intermediary between a user's device and the internet, receiving requests from clients, forwarding them to the relevant server, and returning the server's response to the client., Network attachment storage (NAS) - dedicated file storage device connected to a network, allowing multiple users and client devices to retrieve and store data from a centralized location., Storage area network (SAN) - dedicated, high- speed network that provides access to consolidated, block-level data storage., Access point (AP) - is a networking device that allows wireless devices to connect to a wired network using Wi-Fi or related standards, operate at the data link layer, Controller - manages wireless access points in a network, centralizing control of the wireless, Content delivery network (CDM) - A globally distributed network of proxy servers and data centers designed to deliver internet content rapidly to users., Virtual private network (VPN) - is a technology that creates a safe and encrypted connection over a less secure network, such as the internet., Quality of service (QoS) - refers to the set of technologies and policies used to manage and prioritize network traffic to ensure the performance of critical applications and services., Time to live (TTL) - a field in the header of IP packets that specifies the maximum time or number of hops a packet is allowed to traverse before being discarded by a router.,
0%
1.2 Networking appliances/apps
Condividi
Condividi
Condividi
di
Gprimal
Comptia
N10-009
Network plus
Modifica contenuto
Stampa
Incorpora
Altro
Compiti
Classifica
Mostra di più
Mostra meno
Questa classifica è privata. Fai clic su
Condividi
per renderla pubblica.
Questa classifica è stata disattivata dal proprietario della risorsa.
Questa classifica è disattivata perché le impostazioni sono diverse da quelle del proprietario della risorsa.
Ripristina le opzioni
Abbinamenti
è un modello a risposta aperta. Non genera punteggi validi per una classifica.
Login necessario
Stile di visualizzazione
Tipi di caratteri
Abbonamento richiesto
Opzioni
Cambia modello
Mostra tutto
Mentre esegui l'attività appariranno altri formati.
Apri risultati
Copia link
Codice QR
Elimina
Ripristinare il titolo salvato automaticamente:
?