This glossary contains the key terms from the book. All the terms from each chapter’s “Define Key Terms” tasks are defined here.
3-leg perimeter A type of DMZ where a firewall has three legs that connect to the LAN, the Internet, and the DMZ.
10 tape rotation A backup rotation scheme in which ten backup tapes are used over the course of two weeks.
802.1X An authentication technology used to connect devices to a LAN or WLAN. It is an example of port-based network access control (NAC).
acceptable use policy (AUP) Policy that defines the rules that restrict how a computer, network, or other system may be used.
access control list (ACL) A list of permissions attached to an object specifying what level of access a user, users, or ...