| Term 
 
        | ACL (Access Control List) |  | Definition 
 
        | A clearly definded list of permisson that specifies what actions an authenticated user may perform on a shared resourse. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | A method of of limiting access to a wireless network based on the physical address of wireless NICs |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | A method of blocking packets based on Ip Address |  | 
        |  | 
        
        | Term 
 | Definition 
 | 
        |  | 
        
        | Term 
 
        | SSL(Secure sockets Layer) |  | Definition 
 
        | A type of VPN that uses____ Encryption. Clients connect the VPN serve using a standard web browser, with the traffic secured using ____. The two most common types of ___ VPNs are ___ portal VPNs and ____ tunnel VPNs. |  | 
        |  | 
        
        | Term 
 
        | VPNs (Virtual Private network) |  | Definition 
 
        | A network configuration that enables a remote user to access a private network via the internet. _____ employ an encryption methodology called tunneling which protects the data from interception. |  | 
        |  | 
        
        | Term 
 
        | L2TP (Layer 2 Tunneling Protocol) |  | Definition 
 
        | A VPN protocol developed by cisco that can be run on almost any connection imaginable. ____ has no autherntication or encryption but uses Ipsec for all its security needs. |  | 
        |  | 
        
        | Term 
 
        | PPTP (Point to Point tunneling Protocol) |  | Definition 
 
        | A protocol that works with PPP to provide a secure data link between computers using encryption. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | A Ip packet encryption protocol. _____ is the only Ip encryption protocol to work at Layer 3 of the OSI seven-layer model. _____ is most commonly seen on VPN. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | The capability to access a computer from outside a building in which it is housed. ____ requires communications hardware, software, and actual physical links. |  | 
        |  | 
        
        | Term 
 
        | RAS(Remote access server) |  | Definition 
 
        | refers to both the hardware component(Servers built to handle the unique stresses of a large number of clients calling in)  and the software component (programs that work with the operation system to allow remote access solution. |  | 
        |  | 
        
        | Term 
 
        | RDP(remote Desktop Protocol) |  | Definition 
 
        | A microsoft-created remote terminal protocol |  | 
        |  | 
        
        | Term 
 
        | PPPoE(Point to point protocol over ethernet) |  | Definition 
 
        | A protocol that was originally designed to encapsulate PPP Frames into ethernet frames. Used by DSL providers to force to log into their DSL Connections instead of simply connecting automatically. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | A protcol that enables a computer to connect to the internet through a dial-in connection and to enjoy most of the benefits of a direct connection. _____ is considered to be superior to SLIP becase of it error detection and data compression features, which SLIP lacks, and the capabiltiy to use dynamic Ip Addresses |  | 
        |  | 
        
        | Term 
 
        | VNC (Virtual Network Computing) |  | Definition 
 
        | Doesn't let you share folders or printers because it is only a terminal emulator but it runs on every operating system, is solid as a rock even runs from a web browser. |  | 
        |  | 
        
        | Term 
 
        | ICA (Independent Computing Architecture) |  | Definition 
 
        | That defined how termical information was passed between the server and the client. |  | 
        |  |