1 | 8 | ||||||||||||||||||||||||
2 | |||||||||||||||||||||||||
3 | 7 | ||||||||||||||||||||||||
4 | |||||||||||||||||||||||||
10 | |||||||||||||||||||||||||
9 | |||||||||||||||||||||||||
5 | |||||||||||||||||||||||||
6 | |||||||||||||||||||||||||
1. A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
2. A network node that connects two networks using different protocols, acting as an entrance and exit point for data.
3. A server is a computer or software program that provides services or resources to clients.
4. A firewall technique that inspects incoming and outgoing packets and determines whether to allow or block them based on predefined criteria.
5. A device that allows a user to communicate with a computer and execute commands.
6. A client is a computer or software program that requests services or resources from a server.
7. The entry point or destination in a communication link.
8. A device that forwards data packets between computer networks. It determines the best path for data to travel.
9. An intermediary device between a client and a server, forwarding requests from the client to the server and returning responses back to the client.
10. A device that connects devices within a network by using packet switching to receive, process, and forward data to the destination device.