router - operates at the network layer of the OSI model, directing data packets between different networks based on IP addresses., switch - operates at the data link layer of the OSI model, forwarding data based on MAC addresses., Firewall - is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules., Intrusion detection system (IDS) - can detect malicious network activity. Uses signature identification techniques like antimalware. Additionally, can detect malicious activity based on anomalous behavior, Intrusion prevention system (IPS) - is used to actively drop packets or connections that are identified as malicious., Load balancer - distributes incoming network traffic across multiple servers to ensure no single server becomes overwhelmed, improving the reliability and availability of applications., Proxy - acts as an intermediary between a user's device and the internet, receiving requests from clients, forwarding them to the relevant server, and returning the server's response to the client., Network attachment storage (NAS) - dedicated file storage device connected to a network, allowing multiple users and client devices to retrieve and store data from a centralized location., Storage area network (SAN) - dedicated, high- speed network that provides access to consolidated, block-level data storage., Access point (AP) - is a networking device that allows wireless devices to connect to a wired network using Wi-Fi or related standards, operate at the data link layer, Controller - manages wireless access points in a network, centralizing control of the wireless, Content delivery network (CDM) - A globally distributed network of proxy servers and data centers designed to deliver internet content rapidly to users., Virtual private network (VPN) - is a technology that creates a safe and encrypted connection over a less secure network, such as the internet., Quality of service (QoS) - refers to the set of technologies and policies used to manage and prioritize network traffic to ensure the performance of critical applications and services., Time to live (TTL) - a field in the header of IP packets that specifies the maximum time or number of hops a packet is allowed to traverse before being discarded by a router.,
0%
1.2 Networking appliances/apps
Поделиться
Поделиться
Поделиться
от
Gprimal
Comptia
N10-009
Network plus
Редактировать контент
Печать
Внедрить
Больше
Задания
Таблица лидеров
Показать больше
Показать меньше
Эта таблица лидеров в настоящее время является частной. Нажмите
Поделиться
, чтобы сделать ее общедоступной.
Эта таблица лидеров была отключена владельцем ресурса.
Эта таблица лидеров отключена, так как у вас и у владельца ресурса разные значения параметров.
Варианты отмены изменения
Сопоставить
— это открытый шаблон. Он не создает баллы для таблицы лидеров.
Требуется вход в систему
Визуальный стиль
Шрифты
Требуется подписка
Параметры
Переключить шаблон
Показать все
Дополнительные форматы будут отображаться при выполнении занятия.
Открыть результаты
Скопировать ссылку
QR-код
Удалить
Восстановить автоматически сохраненное:
?