5a - Network Security Flashcards
Uses duplication of critical components/devices, increasing the reliability of the system.
Redundancy
Eliminates a single point of power failure within the network.
Redundant power
Comes in various sizes and can sustain network operations for only a limited time in the event of an outage.
UPS
Provides incremental trunk speeds by combining multiple interfaces to act as one link.
Link Aggregation
Used primarily on Cisco switches;
Allows multiple physical ethernet links to combine into one logical channel.
EtherChannel
Lets you monitor network nodes from a management server.
SNMP
SNMPv1
Operates over UDP, IP, OSI CLNS, DDP, and IPX
SNMPv2
Revises v1 and improves on security, confidentiality, and manager-to-manager communications.
SNMPv3
Added security and remote configuration to SNMP;
The preferred version and required on AF networks.
Any program or code designed to do something on a system or network that you don’t want to have happen.
Malware
A program that has two jobs: replicate and activate.
Virus
Replicates exclusively through networks.
Worm
Can be embedded into a program file and automatically runs when the file is opened.
Macro Virus
A piece of malware that looks or pretends to do one thing while doing something bad.
Trojan horse
Usually a trojan horse that takes advantage of very low-level operating system functions to hide from all but the most aggressive of antimalware tools.
Rootkit
A program that monitors the types of websites you frequent and uses that information to generate targeted advertisements.
Adware
A function of any program that sends information about your system or your actions over the Internet.
Spyware
The process of using or manipulating people inside the network environment to gain access to that network from the outside.
Social Engineering
When the attacker poses as some trusted site, such as your bank, so you could put in your personal information.
Phishing