ch 6 Flashcards

1
Q

Hardware or software device used to join two separate computer networks to enable communication between them

A

• Bridges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A device that connects network hosts intelligently.

A

• Switches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Forwards packets across different computer networks.

Operates at a Network Layer (layer3)

A

• Routers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

acts upon data found in Network and transport layer protocols

A

• Layer 4 Load balancer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Distribute requests based on data found in application layer protocols.

A

• Layer 7 load balancer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

a computer or an application program that intercepts user requests from the internal network and processes that request on behalf of the user.

A

Forward proxy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A special proxy server that “knows” the application protocols that it supports.

A

• Application/Multipurpose

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Routs requests coming from an external network to correct internal server.

A

• Reverse Proxy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Does not require any configuration on the user’s computer.

A

• Transparent Proxy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Can be software or hardware based.

Both types inspect packets and either accept or deny entry.

A

• Firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

– Inspects incoming packet and permits or denies based on conditions set by administrator

A

• Stateless Packet Filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

– (lets packets pass through)

A

Allow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

– (prevent the packet from passing into the network and send no response to sender)

A

Drop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

– (prevent the packet from passing into the network but send a message to the sender).

A

Reject

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

– Operates on a higher level by identifying applications that send packets through the firewall and make decisions about actions to take.

A

• Application-Aware Firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

– Special type of application aware firewall that looks deeply into packets that carry HTTP traffic. Can block specific sites of HTTP traffic

A

• Web application Firewall (WAF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

enables authorized users to use an unsecured public network as if it were a secure private network.

A

• (VPN) Virtual Private Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

a user to LAN connection

A

• Remote access VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Multiple sites can connect to other sites over the internet

A

• Site to Site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Allow the user to always stay connected.

A

• Always on VPNs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

end of the tunnel between VPN devices, may be software on local computer or a VPN concentrator.

A

Endpoints

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A dedicated hardware device that aggregates hundreds of thousands of VPN connections.

A

• VPN concentrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

some traffic is routed over the secure VPN, while other traffic directly accesses the internet.

A

• Split Tunneling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

(SMTP)

A

Simple Mail Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
(POP/POP3)
Post Office Protocol
26
(IMAP)
Internet Message Access Protocol
27
is a more recent and advanced email system
• (IMAP) Internet Message Access Protocol
28
Monitors email for unwanted content.
• Mail Gateway
29
Can detect attack as it occurs
• (IDS) Intrusion detection system
30
– Compares current detected behavior with baseline
• Anomaly- based Monitoring
31
Looks for well-known attack signature patterns
• Signature based monitoring
32
Detects abnormal actions by processes or programs, alerts user who decides whether to allow or black activity.
• Behavior based monitoring
33
– Uses experience based techniques
• Heuristic Monitoring
34
A software- based application that can detect an attack as it occurs. Monitors, system calls and files, unauthorized registry modification, anomalous activity.
• (HIDS) Host intrusion detection system
35
watches for attack on the network, sensors installed on firewalls and routers, can sound alarm and log events.
• (NIDS) Network intrusion detection system-
36
aware IDS- a specialized IDS, uses “contextual knowledge” in real time, it can know the version of the OS or which application is running.
• Application
37
Monitors network traffic to immediately block a malicious attack, similar to NIDS.
• (IPS) Intrusion Prevention System
38
knows which application are running as well as the underlying OS.
• Application aware IPS
39
Consolidates real-time monitoring and management of security information.
• (SIEM) Security and Information Event Management
40
a dedicated cryptographic processor that provides protection for cryptographic keys
hardware security module
41
a separate device that decrypts SSL traffic
SSL decryptor
42
a seperate hardware card that insets into a web server that contains one or more co-processors to handle SSL/TLS processing
SSL/TLS accelerator
43
a device that converts media data from one format to another
Media gateway
44
integrated device that combines several security functions
Unified Threat Management (UTM)
45
monitors internet traffic and blocks access to preselected websites and files
internet content filter
46
Blocks malicious content in real time as it would appear without first knowing the URL at a dangerous site.
Web Security Gateway
47
a separate network located outside the secure network. (unsecure)
• (DMZ) Demilitarized Zones
48
Allows private IP addresses to be used on the public internet, replaces private IP addresses with public addresses. Masks IP addresses
• (NAT) Network address Translation
49
a private network that belongs to an organization that can only be accessed by internal users
intranet
50
a private network that can be accessed by authorized external customers, vendors, and partners
extranet
51
a separate open network that anyone can access without prior authorization
guest network
52
Isolates the network so that it is not accessible by outsiders.
• Physical Network Segregation
53
The absence of any type of connection between devices, (a secure network and a regular network
• Air gap
54
allow scattered users to be logically grouped together, even if attached to different switches.
• (VLAN) Virtual Lan
55
protocol is used for communicating between switches
special “tagged” (802.1Q)
56
Examines the current state of a system or network device before it can connect to the network
• (NAC) Network Access Control
57
disappears after reporting information to the NAC | NAC technology can be embedded within a Microsoft Windows Active Directory domain controller.
Dissolve NAC agent
58
NAC uses AD to scan the device
agent-less NAC)
59
system of security tools that is used to recognize and identify data that is critical to the organization.
• (DLP) data loss prevention
60
is used for Monitoring emails through mail gateway, blocking and copying files to a USB flash drive (USB Blocking).
• (DLP) data loss prevention
61
Defined as a security analysis of the transaction within its approved context.
Content inspection –
62
Three types of DLP sensors
DLP network sensors DLP storage sensors DLP agent sensors (host)