10) Network Security Flashcards
This firewall uses a state table to keep track of the connection state of a data packet and will only allow traffic to pass that is part of a new or already existing conneciton.
Stateful packet inspection
Large amounts of data traffic are inspected to detect signature-based or anomaly-based attacks.
Network IDS
Breaking up a network into subnets to boost performance and to allow or disallow certain data traffic flows.
Network segmentation
Determining whether to allow a data packet to move forward based on source or destination IP address, port number, or protocol.
Packet filtering
This device can provide security and performance features and can serve as a choke point.
Proxy server
A way to keep our network traffic content from being logged by our ISP is ___.
a) VPN
b) P2P
c) POP
d) Telnet
VPN
The toolset a corporation might use to centrally manage phones provided to its employees is ___.
a) Raspberry Pi
b) MDM
c) BYOD
d) Android
b) MDM
MDM is a solution that runs an agent on mobile devices to enforce certain configurations. What does MDM stand for?
Mobile Device Management
A tool used to test the security firewall.
Hping3
A tool used to detect unauthorized wireless access points.
Kismet
A versatile tool able to scan ports, search for hosts on the network, and other operations.
Nmap
This command-line packet sniffing tool runs on Linux and UNIX operating systems
Tcpdump
A graphical interface protocol analyzer capable of filtering, sorting, and analyzing both wired and wireless network traffic.
Wireshark
This method of security involves a well-configured and patched network, and incorporating elements such as network segmentation, choke points, and redundancy.
Security in network design
The act of dividing a network into multiple smaller networks, each acting as its own small network (subnet)
Network segmentation
Certain points in the network, such as routers, firewall, or proxies, where we can inspect, filter, and control network traffic.
Choke points
A method of security that involves designing a network to always have another route if something fails or loses connection.
Redundancy