Chapter 10 Flashcards

1
Q

What are the 3 types of authentication mechanisms with an example? (!!)

A
  • Something a person knows: PIN
  • Something a person has: Card
  • Something a person can produce: Fingerprint
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What 3 human characteristics are truly unique?

A
  • Fingerprints
  • Eye retina
  • Eye iris
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How are biometric technologies evaluated?

A

-False Reject Rate (Type I Error): not very serious, unless it hinders productivity.

-False Accept Rate (Type II Error): very serious and can cause a breach.

-Crossover Error Rate (Equal Error Rate): represents the balance between the 2 error rates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What’s a Firewall?

A

A device that monitors information when moving in or out of the network.
It can be a computer system, server, network, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the 4 most common types of firewalls?

A

-Packet Filtering Firewalls: filters by examining packet headers.

-Application Layer Proxy Firewalls: Works like packet filtering firewall, but at the application layer. And provides both a firewall and proxy.

-Stateful Packet Inspection Firewalls (SPI): uses a state table to keep track of network connections.

-Unified Threat Management (UTM) Devices: can perform deep packet inspection, and able to perform the work of a SPI firewall.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How do you select the right firewall?

A

-does it have a good balance between protection and cost?

-What are the features included in the base price, and features at extra cost.

-Is the firewall easy to configure?

-Can it adapt to a growing network?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a content filter?

A

A tool that allows restriction of content coming in the network, commonly used to block websites that are not business related.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How does IPS technology prevent attacks?

A
  • Stopping the attack by terminating the connection.
  • Reconfiguring the network to block access.
  • Changing the attacks content to make it not harmful. (ex: removing malware from an email before it reaches its recepient)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Name 4 types of IDPS’s:

A

-Host-Based IDPS: monitors individual devices internals and files.

-Network-Based IDPS: monitors network by looking for patterns.

-Signature-Based IDPS: matches traffic with predetermined signatures.

-Anomaly-Based IDPS: looks for abnormal activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

2 ways to secure bluetooth devices:

A

-Turn bluetooth off when unused.
-Do not accept unknown pairing requests.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are 3 Scanning and analysis tools?

A

-Port Scanners: a group of software that can detect active computer ports.

-Vulnerability Scanners: can scan networks for very detailed information.

-Packet Sniffers: collects and analyzes packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is “Fingerprinting”?

A

An examination of the organizations network addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly