Chapter 11 Flashcards
____ increases reliability by eliminating single points of failure.
Redundancy
Network ___ can be achieved by duplicating network equipment and links (a server form)
Redundancy
Match instant messaging, FTP, Voice SMTP to their priority.
High, Medium, Normal, Low, Backbone Network
Voice - High, SMTP - Medium, Instant messaging - Normal, FTP - Low, SMTP and Instant Messaging -
Backbone Network
To scale a network, several elements are required? (4)
Network documentation, device inventory, budget, traffic analysis.
___ are tools to help network administrators understand the protocols in use in the network.
Protocol Analyzers.
Common types of digital threats (4):
info, data loss and manipulation, identity theft, disruption of service.
Common types of physical threats (4):
hardware, environmental, electrical, maintenance
Name three primary vulnerabilities.
Technical - protocols, operating system, network equip
Configuration - misconfigured devices, default config values, easily guessed passwords
Security policy - lack of, software/hardware install not consistent with security, no disaster or recovery plan.
Name three types of malware attacks.
Virus, worms, trojan horses
What aquires info on targeted systems or network to search for vulnerabilities, uses free and/or public internet services, uses port scanners and packet sniffers?
Reconnaissance attacks
What gains access to info to have no right to view, uses password attacks, trust exploitation, port redirection, man in the middle?
Access attacks
What prevents authorized people from using a service by consuming system resources to prevent attacks important to have the latest security and is difficult to eliminate?
DOS (denial of service)
Name common DOS attacks.
Ping of death, SYN flood, DDOS, Smurf attack
To mitigate worm attacks, ____ for all known vulnerabilities must be applied.
patches
What’s the best way to keep up to date from attacks?
backup, upgrade, patch