| término   | definición   | 
        
        | empezar lección |  |   environment built around multiple controls design to ensure that a failure in a single Control - or even multiple controls is unlikely to cause a security breach  |  |  | 
| empezar lección |  |   the Open Systems Interconnection model is used to conceptually describe how devices and software operator together through networks. the OSi model Has 7 layers  |  |  | 
| empezar lección |  |   divides a network up into logical or physical groupings that are frequently based on trust boundaries, functional requirenents, or other reasons that help an organization apply controls or assist with functionality.  |  |  | 
| empezar lección |  |   Virtual Local Ares Network one of the most knkwn technologu or concept for network segmentation. A VLAN seta up a broadcast domain that is segmented at the Data Link Layer  |  |  | 
| empezar lección |  |   a broadcast domain is a segment of a network in which all devices or Systems can reach one another via packets sent as a broadcast at the Data Link layer  |  |  | 
| empezar lección |  |   east west traffic is used to describe the traffic flow in data center (the same security żonę)  |  |  | 
| empezar lección |  |   network Access Control z determines whether a device should be allowed to connect to a network  |  |  | 
| empezar lección |  |   capability that allows to limit the number of MAC addresses that can be used on a single port. this prevents a number of possible problems including MAC (hardware) address spoofing, CAM table overflows, plugging in additional network devices in somecase  |  |  | 
| empezar lección |  |   The CAM (Content Addressable Memory) table in a network switch is like a phonebook for devices in a network. It keeps track of which device (identified by its MAC address) is connected to which port on the switch.  |  |  | 
| empezar lección |  |   CAM table overflow occurs when a network switch's Content Addressable Memory (CAM) table reaches its maximum capacity and cannot store any more MAC address/port mappings.  |  |  | 
| empezar lección |  |   In networking, a "loop" refers to a situation where there are multiple paths between two points in a network, causing packets to continuously circulate without reaching their intended destination.  |  |  | 
| empezar lección |  |   Sends a copy of all traffic sent to one switch port to another switch port for monitoring  |  |  | 
| empezar lección |  |   Switch Port Analyzer do the same thing as port mirror but also can combines traffic from multiple ports to a single port for analysis  |  |  | 
| empezar lección |  |   Virtual Private Network is a way to create a virtual network linę across a public network that allows endpoints to act as though they are on the same network  |  |  | 
| empezar lección |  |   allow the WAP the ability to accept or deny connections based on the clients device hardware (to MAC address)  |  |  | 
| empezar lección |  |   Lightweight Directory Access Protocol- is a protocol that allows user or serivce to acces and modify directory information over a network  |  |  |