5a - Network Security Flashcards

1
Q

Uses duplication of critical components/devices, increasing the reliability of the system.

A

Redundancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Eliminates a single point of power failure within the network.

A

Redundant power

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Comes in various sizes and can sustain network operations for only a limited time in the event of an outage.

A

UPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Provides incremental trunk speeds by combining multiple interfaces to act as one link.

A

Link Aggregation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Used primarily on Cisco switches;
Allows multiple physical ethernet links to combine into one logical channel.

A

EtherChannel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Lets you monitor network nodes from a management server.

A

SNMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

SNMPv1

A

Operates over UDP, IP, OSI CLNS, DDP, and IPX

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

SNMPv2

A

Revises v1 and improves on security, confidentiality, and manager-to-manager communications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SNMPv3

A

Added security and remote configuration to SNMP;
The preferred version and required on AF networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Any program or code designed to do something on a system or network that you don’t want to have happen.

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A program that has two jobs: replicate and activate.

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Replicates exclusively through networks.

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Can be embedded into a program file and automatically runs when the file is opened.

A

Macro Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A piece of malware that looks or pretends to do one thing while doing something bad.

A

Trojan horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Usually a trojan horse that takes advantage of very low-level operating system functions to hide from all but the most aggressive of antimalware tools.

A

Rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A program that monitors the types of websites you frequent and uses that information to generate targeted advertisements.

A

Adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A function of any program that sends information about your system or your actions over the Internet.

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The process of using or manipulating people inside the network environment to gain access to that network from the outside.

A

Social Engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

When the attacker poses as some trusted site, such as your bank, so you could put in your personal information.

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A type of phishing that targets specific individuals or groups within an organization.

A

Spear phishing

21
Q

A highly targeted phishing attack aimed at senior executives masquerading as a legitimate email.

A

Whaling

22
Q

When a person goes through the trash in order to find personal information.

A

Dumpster diving

23
Q

When a person inserts themselves into a conversation between two others, covertly intercepting traffic thought to be only between two people.

A

Man in the middle attack

24
Q

Floods the network with so many requests that it becomes overwhelmed and stops functioning.

A

DoS
Denial of Service

25
Q

Using another person’s network without permission.

A

Leeching

26
Q

Four types of encryption

A

WEP, WPA, WPA2, and WPA3

27
Q

An unauthorized WAP installed on the network.

A

Rogue access point

28
Q

A rogue access point that looks like a legitimate access point.

A

Evil twin

29
Q

Occurs when a user identifies themselves to the system, and the identity is verified against an authentication database.

A

Authentication

30
Q

Occurs after the user has been authenticated.

A

Authorization

31
Q

The tracking of network and resource usage on the network.

A

Accounting

32
Q

States what users are allowed and not allowed to do on the company’s network.

A

Acceptable Use Policy (AUP)

33
Q

Protect networks from potential attacks outside the network by filtering packets using a number of methods.

A

Firewalls

34
Q

Permits or denies access to the network based on the MAC address of the client.

A

MAC address filtering

35
Q

Like MAC address filtering, except filtering is based on IP addresses instead of MAC addresses.

A

IP Address filtering / Packet filtering

36
Q

Prevents the passage of any TCP or UDP segments/datagrams through any port other than the ones prescribed by the system administrator.

A

Port filtering

37
Q

A method used by firewalls to prevent a hacker from gaining access to the real IP address.

A

Hiding the real IP address

38
Q

A software utility that detects, prevents, and removes viruses, worms, and other malware from a computer.

A

Anti virus

39
Q

Software tools and programs designed to identify and prevent malicious software, or malware, from infecting computer systems or electronic devices.

A

Anti-malware software

40
Q

Inspects incoming packets looking for active intrusions; does NOT take any actions to stop the attack.

A

Intrusion Detection System
IDS

41
Q

Similar to IDS, but adds the capability of actively prevent intrusions.

A

Intrusion Prevention System
IPS

42
Q

Proactively identifies security vulnerabilities of computing systems in a network to determine if and where a system can be exploited and/or threatened.

A

Vulnerability scanners

43
Q

The name assigned to a wi-fi network; a text string that is up to 32 bytes long.

A

SSID

44
Q

A security access control method whereby the 48-bit address assigned to each wireless NIC is used to determine access to the network.

A

MAC address filtering

45
Q

A security algorithm for IEEE 802.11

A

WEP
Wired Equivalent Privacy

46
Q

An intermediate measure to take the place of WEP.

A

WPA

47
Q

Implements the mandatory elements of IEEE 802.11i.

A

WPA2

48
Q

Adds better protection from brute-force dictionary attacks and adds individualized data encryption.

A

WPA3