2.0 Tools and Technologies Flashcards

1
Q

A table or data file that specifies whether a user or group has access to a specific resource on a computer or network.

A

ACL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A combination of hardware and software filters placed between trusted and untrusted networks intended to protect a network from attack by hackers who could gain access through public networks, including the Internet.

A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A condition that states that unless otherwise given, the permission will be denied.

A

Implicit deny

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Firewall that filters packets based on the full context of a given network connection.

A

Stateful Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Firewall that is designed to protect networks based on static information such as source and destination.

A

Stateless Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Firewall that are designed to protect the public-facing servers providing specific applications

A

Application-based Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Firewall that controls traffic going in and out of a network.

A

Network-based Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A set of protocols that enable encryption, authentication, and integrity over IP. IPSec is commonly used with virtual private networks (VPNs) and operates at Layer 3.

A

IPSec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

An IPSec header used to provide connectionless integrity and data origin authentication for IP datagrams and to provide protection against replays.

A

Authentication Header (AH)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A technology used to securely connect to an organization’s internal network by tunneling unsecure protocols and data over a secure connection through an unsecure external network, such as the internet, to secure a device.

A

VPN (Virtual Private Network)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

An IPSec header used to provide a mix of security services in IPv4 and IPv6. ESP can be used alone or in combination with the IP Authentication Header (AH).

A

ESP (Encapsulating Security Payload)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A system that is not only responsible for detecting network attacks based upon certain traffic characteristics, but also has the ability to prevent and stop attacks upon detection.

A

NIPS (Network Intrusion Prevention System)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A system that detects network attacks based upon certain traffic characteristics.

A

NIDS (Network Intrusion Detection System)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A system that uses signatures to scan for attacks or viruses and then alerts the administrator.

A

Signature-based System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A system that relies on an established pattern of behavior, typically through the establishment of a usage baseline, in order to detect unusual patterns, such as network attacks or misuse.

A

Heuristic/Behavioral Based System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A system that relies on an established pattern of behavior, typically through the establishment of a usage baseline, in order to detect unusual patterns, such as network attacks or misuse.

A

Anomoly/Behavioral Based System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A system that combines the best of both anomoly-based and signature-based systems.

A

Heuristic Based System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A flagged event that isn’t really an event and has been falsely triggered.

A

False Positive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

An event that should be flagged but isn’t.

A

False Negative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A hardware device used to connect physically separate local area networks. These devices direct traffic based upon logical Internet protocol addresses, and also eliminate broadcast domains, since broadcasts cannot normally cross router connections to different networks.

A

Router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A method used on some routers to protect against spoofing attacks . A common implementation is to implement specific rules to block certain traffic.

A

Antispoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A network device that can replace a router or hub in a local network and get data from a source to a destination. Switching allows for higher speeds.

A

Switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

The “Data Link Layer” identifies devices on the physical layer.
MAC addresses and Bridges operate at the Data Link Layer

A

Layer 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

The “Network Layer” moves packets between computers on different networks.
Routers, IP, IPX operate at the “Network Layer”

A

Layer 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

A method of preventing switching loop or bridge loop problems.
STP and RSTP prevent switching loops.

A

Loop Prevention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

A structuire of thwarting flood attacks.
On Switches, a flood guard thwarts MAC flood attacks.
On routers, a flood guard prevents SYN Flood Attacks.

A

Flood Guard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

A type of system that prevents direct communication between a client and a host by acting as an intermediary.

A

Proxy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

A device or software that recognizes application-specific commands and offers granular control over them.

A

Application Proxy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Dividing a load for greater efficiency of management among multiple devices.

A

Load Balancer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Scheduling method used with load balancers. It uses client IP addresses to ensure the client is redirected to the same server during a session.

A

Affinity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Scheduling method used with load balancers. It redirects each client request to servers in a predetermined order.

A

Round-Robin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

The point at which access to a network is accomplished. This term is often used in relation to a wireless access point (WAP).

A

AP (Access Point)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

The Service Set Identifier (SSID) is used by the access point of a wireless LAN to identify itself and is intended to be unique for a particular area/entity on a network.

A

SSID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Form if NAC to allow or block access based on the MAC address.
Its configured on switches for port security or on AP’s for wireless security.

A

MAC Filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Refers to the technologies and products used to integrate security information management and security event management information into a centralized interface, providing real-time event correlation and analysis.

A

SIEM (Security Information and Event Management)

36
Q

A switch used to connect multiple switches together into a network. Switches connect to the aggregation switch and it connects to a router.

A

Aggregation Switch

37
Q

A self replicating malware that travels through a network. They do not need user interaction to execute.

A

WORM

38
Q

Software or techniques designed to detect attempts to exfiltrate data.

A

DLP (Data Loss Prevention)

39
Q

Solutions specifically protect organizations that have adopted cloud storage by ensuring sensitive data does not make its way into the cloud without first being encrypted and is only sent to authorized cloud applications.

A

Cloud-Based DLP

40
Q

The set of standards defined by the network for clients attempting to access it. Usually, NAC requires that clients be virus free and adhere to specified policies before allowing them on the network.

A

NAC (Network Access Control)

41
Q

A NAC agent that runs on a client, but deletes itself later. It checks the client for healt.

A

Dissolvable Agent

42
Q

A NAC that is installed on a client permanently. It checks for client health.

A

Permanent Agent

43
Q

A process that scrambles, or ciphers, data to make it unreadable.
Usually includes a public algorithm and a private key.

A

Encryption

44
Q

A network device used to connect multiple networks together. It can be used other than a router in some situations.

A

Bridge

45
Q

A server that examines and processes all incoming and outgoing emails.
It typically includes a spam filter and DLP capabilities.

A

Mail Gateway

46
Q

A software or hardware tool that has the capability to collect and analyze network traffic information.

A

Protocol Analyzer/Packet Analyzer

47
Q

A tool that enumerates your network and provides a map of the network.

A

Network Scanner

48
Q

A process used to discover devices on a network, including how they are connected.

A

Network Mapping

49
Q

A network scanner that scans wireless frequency bands.

A

Wireless Scanner

50
Q

Identifying specific vulnerabilities in your network.

A

Vulnerability Scanner

51
Q

The practice of hiding data within data.

A

Steganography

52
Q

A fake system designed to divert attackers from your real systems. It is often replete with logging and tracking to gather evidence.

A

Honeypot

53
Q

A network that functions in the same manner as a honeypot.

A

Honeynet

54
Q

A method used to gain information about a remote system. It identifies the operating system and other details on the remote system.

A

Banner Grabbing

55
Q

Command line tool used to test connectivity with remote systems.

A

ping

56
Q

A command line tool used to show network statistics on a system.

A

netstat

57
Q

A command line tool used to trace the route between two systems.

A

tracert

58
Q

A command line tool used to test DNS on Microsoft systems.

A

nslookup/dig

59
Q

A command line tool used to show and manipulate the ARP Cache.

A

arp

60
Q

A command line tool used on Windows Systems to show the configuration settings on a NIC.

A

ipconfig

61
Q

A command line tool used on Linux systems to show and manipulate setting on a network interface card.

A

ifconfig

62
Q

A command line protocol analyzer. Administrators use it to capture packets.

A

tcpdump

63
Q

A command line tool used to scan networks. A type of network scanner.

A

nmap

64
Q

A command line tool used to connect remote systems.

A

netcat

65
Q

An intrusion detection system that is host based. An alternative is an intrusion detection system that is network based.

A

HIDS (Host-Based Intrusion Detection System)

66
Q

An intrusion prevention system that is host based. An alternative is an intrusion prevention system that is network based.

A

HIPS (Host-Based Intrusion Prevention System)

67
Q

Software that identifies the presence of a virus and is capable of removing or quarantining the virus.

A

Antivirus

68
Q

The concept of implementing multipurpose security devices that perform a wide variety of functions, including firewall, proxy, VPN, and data loss prevention functions.

A

UTM (Unified Threat Management)

69
Q

A communication system that allows devices to connect to a satellite for communications.

A

SATCOM (Satellite Communications)

70
Q

A practice where mobile devices are configured to alert the administrator if they are removed from a particular area, such as the business campus.

A

Geofencing

71
Q

The location of a device identifies by GPS. It can help locate a lost or stolen mobile device.

A

Geolocation

72
Q

Mobile device environment in which employees are allowed to use their personally owned devices to access. store. and process data belonging to the organization.

A

BYOD (Bring Your Own Device)

73
Q

A mobile device deployment model. The organization purchases and issues devices to employees.

A

COPE (Corporate Owned/Personally Enabled)

74
Q

A mobile device deployment model. Employees can connect their personally owned device to the network as long as the device is on a pre-approved list.

A

CYOD (Choose Your Own Device)

75
Q

Users access a server hosting virtual desktops and run the desktop operating system from the server.

A

VDI (Virtual Desktop Infrastructure)

76
Q

A suite of security extensions proposed and and used by the U.S. government and other entities that allows for secure Domain Name System (DNS) queries and zone transfers.

A

DNSSEC (DNS Security Extenstions)

77
Q

A secure remote connection/terminal emulation program that is not only a protocol but also a suite of secure utilities.

A

SSH (Secure Shell)

78
Q

Secure version of the Multipurpose Internet Mail Extensions (MIME) protocol built into every e-mail client that enables users to make e-mail attachments.

A

S/MIME (Secure MIME)

79
Q

A protocol used to encrypt and provide authentication for Real-time Transport Protocol (RTP) traffic. Used for audio/video streaming.

A

SRTP (Secure Real-time Transport Protocol)

80
Q

A protocol that us used in distributed directory services networks such as Active Directory, to assist hosts in locating network resources.

A

LDAP (Lightweight Directory Access Protocol)

81
Q

An application-level protocol used to transfer files from one host to another.

A

FTP (File Transfer Protocol)

82
Q

An extension of Secure Shell (SSH) used to encrypt FTP traffic.

A

SFTP (Secure File Transfer Protocol)

83
Q

A protocol used to monitor and manage network devices such as routers and switches.

A

SNMPv3 (Simple Network Management Protocol Version 3)

84
Q

Used to encrypt data-in-transit with the use of certificates.

A

SSL/TLS (Secure Sockets Layer)

85
Q

A protocol usedd to encrypt HTTP traffic.

A

HTTPS (Hypertext Transfer Protocol Secure)

86
Q

One of two client-level e-mail protocols that receive e-mail from SMTP servers.

A

Secure POP/IMAP