Chap2: Technologies and Tools 2 Flashcards
Other than a firewall, what other device uses ACL?
Router
Setting up a non-secure remote session to your LAN.
Policy violation
IPSec mode between two servers on your LAN.
Transport mode
The system does not detect an attack.
False negative
Add an application, EXE, or a DLL so it will run.
Whitelist
What will you do if a mobile phone is lost or stolen?
Remote wipe
Prevent DNS poisoning by using DNSSEC. What records
are created?
RRSIG
Holds a cryptographic signature for a set of DNS records, or RRset, to verify their authenticity
Lets you monitor the attack methods used.
Honeypot
Used to protect PII and sensitive information from leaving the company by email or USB.
DLP
A NIPS where all the traffic flows through it.
Inline
How to keep personal and business data separate on a cell phone.
Storage segmentation
A tool that tells you the patch version of a web server.
Banner grabbing
A firewall that can also perform malware inspection.
UTM.
Unified threat management (UTM) refers to when multiple security features or services are combined into a single device within your network. Using UTM, your network’s users are protected with several different features, including antivirus, content filtering, email and web filtering, anti-spam, and more.
IPSec mode in a site-to-site VPN.
Tunnel mode
A passive device that works with a NIPS.
NIDS
A Network Intrusion Detection System (NIDS) is a security tool that monitors network traffic for suspicious activity and alerts administrators when it detects something abnormal.