10) Network Security Flashcards

1
Q

This firewall uses a state table to keep track of the connection state of a data packet and will only allow traffic to pass that is part of a new or already existing conneciton.

A

Stateful packet inspection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Large amounts of data traffic are inspected to detect signature-based or anomaly-based attacks.

A

Network IDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Breaking up a network into subnets to boost performance and to allow or disallow certain data traffic flows.

A

Network segmentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Determining whether to allow a data packet to move forward based on source or destination IP address, port number, or protocol.

A

Packet filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

This device can provide security and performance features and can serve as a choke point.

A

Proxy server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A way to keep our network traffic content from being logged by our ISP is ___.

a) VPN
b) P2P
c) POP
d) Telnet

A

VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The toolset a corporation might use to centrally manage phones provided to its employees is ___.

a) Raspberry Pi
b) MDM
c) BYOD
d) Android

A

b) MDM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

MDM is a solution that runs an agent on mobile devices to enforce certain configurations. What does MDM stand for?

A

Mobile Device Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A tool used to test the security firewall.

A

Hping3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A tool used to detect unauthorized wireless access points.

A

Kismet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A versatile tool able to scan ports, search for hosts on the network, and other operations.

A

Nmap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

This command-line packet sniffing tool runs on Linux and UNIX operating systems

A

Tcpdump

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A graphical interface protocol analyzer capable of filtering, sorting, and analyzing both wired and wireless network traffic.

A

Wireshark

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

This method of security involves a well-configured and patched network, and incorporating elements such as network segmentation, choke points, and redundancy.

A

Security in network design

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The act of dividing a network into multiple smaller networks, each acting as its own small network (subnet)

A

Network segmentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Certain points in the network, such as routers, firewall, or proxies, where we can inspect, filter, and control network traffic.

A

Choke points

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A method of security that involves designing a network to always have another route if something fails or loses connection.

A

Redundancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A mechanism for maintaining control over the traffic that flows into and out of our networks.

A

Firewall

19
Q

A firewall technology that inspects the contents of each packet in network traffic individually and makes a gross determination of whether the traffic should be allowed to pass.

A

Packet filtering

20
Q

A firewall technology that functions on the same general principle as packet filtering firewalls, but is able to keep track of the traffic at a granular level. Has the ability to watch the traffic over a given connection.

A

Stateful packet inspection

21
Q

A firewall technology that can analyze the actual content of the traffic that is flowing through.

A

Deep packet inspection

22
Q

A specialized type of firewall that can serve as a choke point, log traffic for later inspection, and provide a layer of security for the devices behind it.

A

Proxy server

23
Q

A combination of a network design feature and a protective device such as a firewall; often used for systems that need to be exposed to external networks but are connected to our network.

A

DMZ

24
Q

DMZ is a combination of a network design feature and a protective device such as a firewall; often used for systems that need to be exposed to external networks but are connected to our network. What does DMZ stand for?

A

Demilitarized Zone

25
Q

A system that monitors the network to which it is connected for unauthorized activity.

A

NIDS

26
Q

An NIDS is a system that monitors the network to which it is connected for unauthorized activity. What does NIDS stand for?

A

Network intrusion detection system

27
Q

An intrusion detection system that maintains a database of signatures that might signal a particular type of attack and compares incoming traffic to those signatures.

A

Signature-based IDS

28
Q

An intrusion detection system that takes a baseline of normal traffic and activity and measures current traffic against this baseline to detect unusual events.

A

Anomaly-based IDS

29
Q

A phrase that refers to an organization’s strategy and policies regarding the use of personal vs. corporate devices.

A

BYOD

30
Q

BYOD is a phrase that refers to an organization’s strategy and policies regarding the use of personal vs. corporate devices. What does BYOD stand for?

A

Bring your own device

31
Q

A solution that manages security elements for mobile devices in the workplace.

A

MDM

32
Q

MDM is a solution that manages security elements for mobile devices in the workplace. What does MDM stand for?

A

Mobile device management

33
Q

A well-known Linux tool used to detect wireless access points.

A

Kismet

34
Q

A Windows tool used to detect wireless access points.

A

NetStumbler

35
Q

A well-known port scanner that can also search for hosts on a network, identify the operating systems those hosts are running, and detect the versions of the services running on any open ports.

A

Nmap

36
Q

Also known as a network or protocol analyzer, this type of tool can intercept traffic on a network.

A

Packet sniffer

37
Q

A fully featured sniffer that is also a great tool for troubleshooting traffic; this well-known tool is used by many network operations and security teams.

A

Wireshark

38
Q

A type of tool that deliberately displays vulnerabilities or attractive data so it can detect, monitor, and sometimes tamper with the activities of an attacker.

A

Honeypot

39
Q

A tool that can map the network topology and help locate firewall vulnerabilities.

A

Hping3

40
Q

A firewall that can watch packets and monitor the traffic from a given connection is using what kind of firewall technology?

A

Stateful packet inspection

41
Q

A specialized type of firewall that provides security and performance features, functions as a choke point, allows for logging traffic for later inspection, and serves as a single source of requests for the devices behind it.

A

Proxy server

42
Q

A popular, fully-featured sniffer capable of intercepting traffic from a wide variety of wired and wireless sources.

A

Wireshark

43
Q

A sniffer that specialized in detecting wireless devices.

A

Kismet

44
Q

A tool that deliberately displays vulnerabilities in an attempt to bait attackers.

A

A honeypot