1.1 Threat Management Flashcards
what is a public cloud?
the standard cloud computing model where a service provider makes resources available to the public over the internet
what does OS fingerprinting involve?
using active fingerprinting to look at the ports (open/closed and the types of responses) and passive fingerprinting to examine the traffic to and from the computer (looking for the default window size or TTL of packets)
what are the three main protocols that can be used for wireless networks?
wired equivalent privacy (WEP), WPAv1, WPAv2
what is the purpose of infrastructure as a service (IaaS) in cloud computing?
it provides computer and server infrastructure, typically through a virtualization environment
what do you use to control traffic from the internet to the LAN (local area network) by controlling the packets that are allowed to enter the LAN?
a firewall
what is the most common type of system used to detect intrusions into a computer network?
NIDS
what is the purpose of PaaS in cloud computing?
it provides not only a virtualized deployment platform but also a value-added solution stack and an application development platform
what is the term for an unauthorized access that a network-based intrusion detection system (NIDS) fails to detect?
missed detection or false positive
what does the acronym IDS denote?
Intrusion detection system
what is the main difference between an IDS and an IPS?
an IDS detects intrusions. an IPS prevents intrusions
what does the acronym ACL denote?
access control list
what devices can limit the effectiveness of sniffing attacks: switches or routers?
switches
what are the two major types of intrusion detection systems (IDS)?
network IDS (NIDS) and host IDS (HIDS)
which type of IDS detects attack on individual devices?
host intrusion detection system (HIDS)
which layer 3 device allows different logical networks to communicate?
router