More cards in this set

Card 6

Front

What is different about an extranet from an intranet?

Back

Preview of the front of card 6

Card 7

Front

User authentication is not necessary for an extranet, true or false?

Back

Preview of the front of card 7

Card 8

Front

What is a perimeter network?

Back

Preview of the front of card 8

Card 9

Front

Why is it called a perimeter network?

Back

Preview of the front of card 9

Card 10

Front

What servers are included in perimeter networks?

Back

Preview of the front of card 10

Card 11

Front

What are the 2 most common DMZ configurations?

Back

Preview of the front of card 11

Card 12

Front

What is a VPN?

Back

Preview of the front of card 12

Card 13

Front

Name 2 popular VPN protocols

Back

Preview of the front of card 13

Card 14

Front

What are firewalls used for?

Back

Preview of the front of card 14

Card 15

Front

What are the 4 main ways to block traffic?

Back

Preview of the front of card 15
View more cards