ch 7 Flashcards

1
Q

• Most common protocol used for LANs

A

(TCP/IP) transmission Control protocol/ Internet protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

• TCP/IP uses a four layer architecture what are they?

A

network interface, internet, transport, application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

(SNMP)

A

Simple Network Management Protocol (basic TCP/IP protocols)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

(DNS)

A

Domain Name System

basic TCP/IP protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

(FTP)

A

File transfer protocol

basic TCP/IP protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Manages network equipment
Allows administrator to remotely manage, monitor, and configure network devices
Exchanges management information

A

• (SNMP) Simple Network Management Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

• Agents are password protected also known as

A

common String.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A TCP/IP protocol that maps IP addresses to their symbolic name.

A

• (DNS) Domain name system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

used for transferring files.

A

• TCP/IP protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

(FTPS) secure sockets layer encrypts commands- uses ?

A

SSL or TLS to encrypt commands

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

•(S/M I M E)

A

Secure/Multipurpose Internet Mail Extensions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A protocol for securing email messages

A

• (S/M I M E) Secure/Multipurpose Internet Mail Extensions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what to use to secure voice and video

A

(SRTP) Secure Real-Time Transport Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what to use to secure time synchronization

A

(NTP) Network time protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what to use to secure email

A

(S/MIME) Secure/ multipurpose internet mail extensions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what to use to secure web browsing

A

(HTTPS) Hypertext transport protocol secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

what to use to secure file transfer

A

secure FTP(SFTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

what to use to secure remote access

A

(VPN) Virtual private network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

what to use to secure domain name resolution

A

(DNSSEC) DNS security extensions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

what to use to secure routing and switching

A

(IPSEC) ip security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

what to use to secure network address translation

A

(IPSEC) ip security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

what to use to secure subscription services

A

(IPSEC) IP security

23
Q
  • a separate hardware card that inserts into a web server that contains co-processors to handle S S L/T L S processing
A

• S S L/T L S accelerator

24
Q

allows the administrator to configure a switch to copy traffic that occurs on some or all ports to a designated port on the switch

A

• Port mirrors

25
- a device that can monitor traffic
• Network tap (test access point)
26
– monitor traffic for network intrusion detection and prevention devices
Sensors
27
gather traffic for S I E M devices
Collectors
28
block traffic for Internet content filters
Filters
29
used to combine multiple network connections into a single link Should be located between routers and servers where they can detect and stop attacks directed at a server or application
• Aggregation switch
30
aggregates and correlates content from different sources to uncover an attack
• Correlation engine
31
- a hardware device that identifies and blocks real-time distributed denial of service (D D o S) attacks
• DDoS mitigator
32
A Microsoft Windows feature that prevents attackers from using buffer overflow to execute malware
• (D E P) Data Execution Prevention
33
- A service that can monitor any changes made to computer files, such as O S files
• (F I C) File integrity check
34
A means of managing and presenting computer resources without regard to physical layout or location
• Virtualization
35
a simulated software-based emulation of a computer | The host system runs a hypervisor that manages the virtual operating systems and supports one or more guest systems
• Virtual machine
36
- The VM monitor program
• Hypervisor
37
The process of running a user desktop inside a V M that resides on a server
• (V D I) Virtual Desktop Infrastructure
38
An Ethernet-compliant virtual network that can connect physical computers and/or virtual machines together
• (V D E) Virtual Distributed Ethernet
39
which allows a virtual machine to be moved to a different physical computer with no impact to users
• live migration
40
- of a particular state of a virtual machine can be saved for later use
• snapshot
41
Testing the existing security configuration, can be performed using a simulated network environment
• security control testing
42
suspicious program can be loaded into an isolated virtual machine and executed
• sandboxing
43
VMs may be able to “escape” from the contained environment and directly interact with the host O S
• virtual machine escape protection
44
The widespread proliferation of V M s without proper oversight or management
• Virtual machine sprawl
45
Enterprises in the past purchased all the hardware and software necessary to run the organization
• On-premises model
46
- Servers, storage, and the supporting networking infrastructure are shared by multiple enterprises over a remote network connection
• Hosted services
47
A model for enabling convenient, on-demand network access to a shared pool of configurable computing resources
• Cloud computing
48
Vendor provides access to the vendor’s software applications running on a cloud infrastructure
• Software as a Service (S a a S)
49
Consumers install and run their own specialized applications on the cloud computing network
• Platform as a Service (P a a S)
50
Vendor allows customers to deploy and run their own software, including O S s and applications
• Infrastructure as a Service (I a a S)
51
All security services are delivered from the cloud to the enterprise
• Security as a Service (SEC a a S)
52
* A set of software tools or services that resides between the enterprises’ on-premises infrastructure and the cloud provider’s infrastructure * Acts as a “gatekeeper”
• (C A S B) Cloud access security broker
53
- Virtualizes parts of the physical network so that it can be more quickly and easily reconfigured
• (S D N) Software defined network