3.00 Flashcards
What is a DMZ?
A DMZ, or a demilitarized zone, is used to connect hosts and provides an interface to an untrusted external network while keeping the internal, private network separated and isolated from the external network.
What is the difference between an extranet and an intranet?
An intranet is used for internal employees, while an extranet allows outside vendors to access information.
Describe the purpose of a VLAN.
A VLAN is a group of devices on one or more LANs that are configured to communicate as if they were attached to the same wire but are located on several different LAN segments.
What are some ways to secure a VLAN?
Some examples to secure a VLAN are:
- Place the router in a locked and restricted area.
- Ensure the VLAN is password protected.
- Configure the switch so each user has a unique login and password.
What is anti-virus software used for?
Anti-virus software is used to prevent hackers from deploying malicious software on a computer network.
How is role-based control used?
RBC is used for configuring hardware so each user has a unique username and password.
What is a security policy?
A security policy is a list of regulations employees must adhere to.
What is network access control?
NAC is a type of access control that can deny network access to noncompliant devices and place them in quarantine. This keeps the network secure and prevents dangerous activity.
What’s the difference between a permanent and a dissolvable agent?
A permanent agent is installed and remains on a client.
A dissolvable agent is downloaded and installed when a client logs on to the network remotely.
What is IAAA?
Identification, Authentication, Authorization, and Accounting (IAAA) is the system used to describe the framework for controlling access to computer resources, controlling usage, and implementing procedures.
What is two-factor authentication?
Two-factor authentication (2FA) builds on passwords to add another layer of security. 2FA combines something like a smart card with something you know, like a PIN or password.
What is a password hash?
A password hash is where a password is turned into a scrambled representation of itself.
What is deciphering?
Deciphering is the process of converting text written in code into normal language.
What is cryptography?
Cryptography is the process of creating written or generated code that allows information to be kept secret.
What is WPA?
WPA is a security protocol designed to create secure wireless (Wi-Fi) networks.