Chapter 10 Flashcards

1
Q

When you divide a network into multiple smaller networks

A

Network Segmentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Mechanism for maintaining control over the traffic that flows into and out of a network

A

Firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

IDS

A

Intrusion Detection Systems (IDS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Hardware or software tools that monitor networks, hosts, or applications for unauthorized activity

A

Intrusion Detection Systems (IDS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

IPS

A

Intrusion Prevention Systems (IPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Refuses traffic from the source of an attack

A

Intrusion Prevention Systems (IPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Works like most antivirus systems

A

Signature-Based IDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Works by first determining the normal kinds of traffic and activity taking place on a network and then measuring the present traffic against the baseline in order to detect patterns that aren’t present inn the traffic normally.

A

Anomaly-Based IDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the method of protecting the traffic that flows through a network?

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

WEP

A

Wired Equivalent Privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

WPA, WPA2, WPA3

A

Wi-Fi Protected Access
Wi-Fi Protected Access 2
Wi-Fi Protected Access 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

VPN

A

Virtual Private Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The simplest and easiest way to protect our data

A

Secure Protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

FTP

A

File Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

POP

A

Post Office Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Used to detect wireless access points. Can find them even when attempts have been made to make doing so difficult

A

Kismet

17
Q

A handy tool for securing communications

A

Secure Shell (SSH)

18
Q

SSH

A

ecure Shell

19
Q

Used for discovering the networks and systems in an environment

A

Port Scanner

20
Q

Nmap (A port scanner)

A

Network Mapper

21
Q

A tool that can intercept traffic on a network. Listens for any traffic that your computer or device’s network interface can see.

A

Packet Sniffer

22
Q

A fully featured sniffer capable of intercepting traffic from a wide variety of wired and wireless sources

A

Wireshark

23
Q

A command-line packet sniffing tool

A

Tcpdump

24
Q

Detects, monitors, and sometimes tampers with the activities of an attacker. (Creating fake vulnerabilities that would make the system attractive to an attacker)

A

Honeypots

25
Q

Expanded Honeypots (Networks of Honeypots)

A

Honeynets

26
Q

ICMP

A

Internet Control Message Protocol

27
Q

A tool that can map the topology of firewalls and help locate vulnerabilities in them

A

Scapy (hping3?)