Define Key Terms
Define the following key terms from this chapter, and check your answers in the glossary:
Tor
Tor exit node
peer-to-peer (P2P) communication
virtual private network (VPN)
remote-access VPN
traffic timing attack
clientless VPN
Secure Shell (SSH)
resource exhaustion attack
traffic fragmentation attack
protocol misinterpretation attack
traffic substitution and insertion attack
pivoting
site-to-site VPN