1.1 Threat Management Flashcards

1
Q

what is a public cloud?

A

the standard cloud computing model where a service provider makes resources available to the public over the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what does OS fingerprinting involve?

A

using active fingerprinting to look at the ports (open/closed and the types of responses) and passive fingerprinting to examine the traffic to and from the computer (looking for the default window size or TTL of packets)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what are the three main protocols that can be used for wireless networks?

A

wired equivalent privacy (WEP), WPAv1, WPAv2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is the purpose of infrastructure as a service (IaaS) in cloud computing?

A

it provides computer and server infrastructure, typically through a virtualization environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what do you use to control traffic from the internet to the LAN (local area network) by controlling the packets that are allowed to enter the LAN?

A

a firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what is the most common type of system used to detect intrusions into a computer network?

A

NIDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is the purpose of PaaS in cloud computing?

A

it provides not only a virtualized deployment platform but also a value-added solution stack and an application development platform

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what is the term for an unauthorized access that a network-based intrusion detection system (NIDS) fails to detect?

A

missed detection or false positive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what does the acronym IDS denote?

A

Intrusion detection system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what is the main difference between an IDS and an IPS?

A

an IDS detects intrusions. an IPS prevents intrusions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what does the acronym ACL denote?

A

access control list

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what devices can limit the effectiveness of sniffing attacks: switches or routers?

A

switches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what are the two major types of intrusion detection systems (IDS)?

A

network IDS (NIDS) and host IDS (HIDS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

which type of IDS detects attack on individual devices?

A

host intrusion detection system (HIDS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

which layer 3 device allows different logical networks to communicate?

A

router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what is the default rule found in a firewall’s access control list (ACL)?

A

deny all

17
Q

what does the acronym NIDS denote?

A

network-based intrusion detection system

18
Q

which security control is lost when using cloud computing?

A

physical control of the data

19
Q

what is the term for an authorized access that a network-based intrusion detection system (NIDS) incorrectly detects as an attack?

A

false positive

20
Q

what are the four types of cloud computing based on management type?

A

public, private, hybrid, and community

21
Q

what is hybrid cloud?

A

a cloud computing environment in which an organization provides and manages some resources in-house and has others provided externally via a public cloud

22
Q

what is multi-tenancy cloud?

A

a cloud model where multiple tenants share the resources. this model allows the service providers to manage the resource utilization more efficiently

23
Q

which type of system identifies suspicious patterns that may indicate a network or system attack?

A

intrusion detection system (IDS)

24
Q

why is data isolation used in cloud environments?

A

to ensure that tenant data in a multi-tenant solution is isolated from other tenant’ data using a tenant ID in the data labels

25
Q

which information do routers use to forward packets to their destinations?

A

the network address and subnet mask

26
Q

what does the acronym HIDS denote?

A

host-based intrusion detection system

27
Q

what is a community cloud?

A

an infrastructure that is shared among several organizations from a specific group with common computing concerns

28
Q

what is the purpose of software as a service (SaaS) in cloud computing?

A

it ensures on-demand, online access to an application suite without the need for local installation

29
Q

what is a single-tenancy cloud?

A

a cloud model where a single client or organization uses a resource

30
Q

what OS footprinting do?

A

it performs the fingerprinting steps as well as gathering additional information, such as polling DNS (check the status/survey), registrar queries, and so on

31
Q

which type of IDS detects malicious packets on a network?

A

network intrusion detection system (NIDS)