ch 6 Flashcards

1
Q

Hardware or software device used to join two separate computer networks to enable communication between them

A

• Bridges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A device that connects network hosts intelligently.

A

• Switches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Forwards packets across different computer networks.

Operates at a Network Layer (layer3)

A

• Routers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

acts upon data found in Network and transport layer protocols

A

• Layer 4 Load balancer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Distribute requests based on data found in application layer protocols.

A

• Layer 7 load balancer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

a computer or an application program that intercepts user requests from the internal network and processes that request on behalf of the user.

A

Forward proxy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A special proxy server that “knows” the application protocols that it supports.

A

• Application/Multipurpose

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Routs requests coming from an external network to correct internal server.

A

• Reverse Proxy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Does not require any configuration on the user’s computer.

A

• Transparent Proxy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Can be software or hardware based.

Both types inspect packets and either accept or deny entry.

A

• Firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

– Inspects incoming packet and permits or denies based on conditions set by administrator

A

• Stateless Packet Filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

– (lets packets pass through)

A

Allow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

– (prevent the packet from passing into the network and send no response to sender)

A

Drop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

– (prevent the packet from passing into the network but send a message to the sender).

A

Reject

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

– Operates on a higher level by identifying applications that send packets through the firewall and make decisions about actions to take.

A

• Application-Aware Firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

– Special type of application aware firewall that looks deeply into packets that carry HTTP traffic. Can block specific sites of HTTP traffic

A

• Web application Firewall (WAF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

enables authorized users to use an unsecured public network as if it were a secure private network.

A

• (VPN) Virtual Private Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

a user to LAN connection

A

• Remote access VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Multiple sites can connect to other sites over the internet

A

• Site to Site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Allow the user to always stay connected.

A

• Always on VPNs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

end of the tunnel between VPN devices, may be software on local computer or a VPN concentrator.

A

Endpoints

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A dedicated hardware device that aggregates hundreds of thousands of VPN connections.

A

• VPN concentrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

some traffic is routed over the secure VPN, while other traffic directly accesses the internet.

A

• Split Tunneling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

(SMTP)

A

Simple Mail Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

(POP/POP3)

A

Post Office Protocol

26
Q

(IMAP)

A

Internet Message Access Protocol

27
Q

is a more recent and advanced email system

A

• (IMAP) Internet Message Access Protocol

28
Q

Monitors email for unwanted content.

A

• Mail Gateway

29
Q

Can detect attack as it occurs

A

• (IDS) Intrusion detection system

30
Q

– Compares current detected behavior with baseline

A

• Anomaly- based Monitoring

31
Q

Looks for well-known attack signature patterns

A

• Signature based monitoring

32
Q

Detects abnormal actions by processes or programs, alerts user who decides whether to allow or black activity.

A

• Behavior based monitoring

33
Q

– Uses experience based techniques

A

• Heuristic Monitoring

34
Q

A software- based application that can detect an attack as it occurs. Monitors, system calls and files, unauthorized registry modification, anomalous activity.

A

• (HIDS) Host intrusion detection system

35
Q

watches for attack on the network, sensors installed on firewalls and routers, can sound alarm and log events.

A

• (NIDS) Network intrusion detection system-

36
Q

aware IDS- a specialized IDS, uses “contextual knowledge” in real time, it can know the version of the OS or which application is running.

A

• Application

37
Q

Monitors network traffic to immediately block a malicious attack, similar to NIDS.

A

• (IPS) Intrusion Prevention System

38
Q

knows which application are running as well as the underlying OS.

A

• Application aware IPS

39
Q

Consolidates real-time monitoring and management of security information.

A

• (SIEM) Security and Information Event Management

40
Q

a dedicated cryptographic processor that provides protection for cryptographic keys

A

hardware security module

41
Q

a separate device that decrypts SSL traffic

A

SSL decryptor

42
Q

a seperate hardware card that insets into a web server that contains one or more co-processors to handle SSL/TLS processing

A

SSL/TLS accelerator

43
Q

a device that converts media data from one format to another

A

Media gateway

44
Q

integrated device that combines several security functions

A

Unified Threat Management (UTM)

45
Q

monitors internet traffic and blocks access to preselected websites and files

A

internet content filter

46
Q

Blocks malicious content in real time as it would appear without first knowing the URL at a dangerous site.

A

Web Security Gateway

47
Q

a separate network located outside the secure network. (unsecure)

A

• (DMZ) Demilitarized Zones

48
Q

Allows private IP addresses to be used on the public internet, replaces private IP addresses with public addresses. Masks IP addresses

A

• (NAT) Network address Translation

49
Q

a private network that belongs to an organization that can only be accessed by internal users

A

intranet

50
Q

a private network that can be accessed by authorized external customers, vendors, and partners

A

extranet

51
Q

a separate open network that anyone can access without prior authorization

A

guest network

52
Q

Isolates the network so that it is not accessible by outsiders.

A

• Physical Network Segregation

53
Q

The absence of any type of connection between devices, (a secure network and a regular network

A

• Air gap

54
Q

allow scattered users to be logically grouped together, even if attached to different switches.

A

• (VLAN) Virtual Lan

55
Q

protocol is used for communicating between switches

A

special “tagged” (802.1Q)

56
Q

Examines the current state of a system or network device before it can connect to the network

A

• (NAC) Network Access Control

57
Q

disappears after reporting information to the NAC

NAC technology can be embedded within a Microsoft Windows Active Directory domain controller.

A

Dissolve NAC agent

58
Q

NAC uses AD to scan the device

A

agent-less NAC)

59
Q

system of security tools that is used to recognize and identify data that is critical to the organization.

A

• (DLP) data loss prevention

60
Q

is used for Monitoring emails through mail gateway, blocking and copying files to a USB flash drive (USB Blocking).

A

• (DLP) data loss prevention

61
Q

Defined as a security analysis of the transaction within its approved context.

A

Content inspection –

62
Q

Three types of DLP sensors

A

DLP network sensors
DLP storage sensors
DLP agent sensors (host)