Chap2: Technologies and Tools 2 Flashcards

1
Q

Other than a firewall, what other device uses ACL?

A

Router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Setting up a non-secure remote session to your LAN.

A

Policy violation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

IPSec mode between two servers on your LAN.

A

Transport mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The system does not detect an attack.

A

False negative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Add an application, EXE, or a DLL so it will run.

A

Whitelist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What will you do if a mobile phone is lost or stolen?

A

Remote wipe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Prevent DNS poisoning by using DNSSEC. What records
are created?

A

RRSIG

Holds a cryptographic signature for a set of DNS records, or RRset, to verify their authenticity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Lets you monitor the attack methods used.

A

Honeypot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Used to protect PII and sensitive information from leaving the company by email or USB.

A

DLP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A NIPS where all the traffic flows through it.

A

Inline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How to keep personal and business data separate on a cell phone.

A

Storage segmentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A tool that tells you the patch version of a web server.

A

Banner grabbing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A firewall that can also perform malware inspection.

A

UTM.

Unified threat management (UTM) refers to when multiple security features or services are combined into a single device within your network. Using UTM, your network’s users are protected with several different features, including antivirus, content filtering, email and web filtering, anti-spam, and more.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

IPSec mode in a site-to-site VPN.

A

Tunnel mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A passive device that works with a NIPS.

A

NIDS

A Network Intrusion Detection System (NIDS) is a security tool that monitors network traffic for suspicious activity and alerts administrators when it detects something abnormal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A stolen Bluetooth phone used for texting your friends and family.

A

Bluejacking

17
Q

A tool that can be used for banner grabbing.

A

Netcat (nc)

18
Q

Can be used instead of a motion sensor to detect motion.

A

Camera

19
Q

Adding a third-party application to your phone.

A

Sideloading

20
Q

How to protect a mobile telephone.

A

FDE, screen locks

Full-disk encryption (FDE) is a security method for protecting sensitive data at the hardware level by encrypting all data on a disk drive. FDE automatically encrypts data and operating systems (OSes) to prevent unauthorized access.

21
Q

The system detects a virus but manual inspection contradicts it.

A

False positive

22
Q

Secure remote access protocol that can use a GUI to access a router.

A

SSH

23
Q

How you could block unwanted applications.

A

Blacklist

24
Q

Used for secure transfer of data between two hosts.

A

TLS