Chapter 12- Perimeter Security Flashcards

1
Q

Security devices focused on the boundry between then LAN and the WAN in your organization’s network.

A

Perimeter Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Inspects each packet passing through the firewall and accepts or rejects it based on the rules.

A

Packet Filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Filters traffic based upon the ports being utilized and type of connection (TCP or UDP).

A

NAT Filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Operates at the session layer and only inspects the traffic during the establishment of the initial session over TCP or UDP.

A

Circuit-Level gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Traffic is allowed to ender or leave the network becasue there is an ACL rule that specifically allows it.

A

Explicit Allow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Traffic is denied the ability to enter or leave the network becasue there is an ACL rule that specifically denies it.

A

Explicit Deny

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Traffic is denied the ability to enter or leave the network because there is no apecific rule that allows it.

A

Implicit Deny

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Firewall installed to protect your server by inspecting traffic being sent to a web application.

A

Web Application Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A device that acts as a middle man between a device and a remote server.

A

Proxy Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Used to secure a network by keeping its machines anonymous during web browsing.

A

IP Proxy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Attempts to serve clinet requests by delivering content from itself without actually contacting the remote server.

A

Caching Proxy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Used in organizations to prevent users from accessing prohibited websites and other content.

A

Internet Content Filter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A go-between device that scans for viruses, filters unwanted content, and performs data loss prevention functions.

A

Web Security Gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A single computer (or file, group of files, or IP range) that might be attractive to an attacker.

A

Honeypot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A group of computers, severs, or networks used to attract an attacker.

A

Honeynet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Systems designed to protect data by conducting content inspection of data being sent out of the network.

A

Data Loss Prevention

17
Q

Attempts to detect, log, and alert on malicious network activities.

A

Network Intrusion Detection Systems

18
Q

Attempts to remove, detain, or redirect malicious traffic.

A

Network Intrusion Prevention Systems

19
Q

Combination of network security devices and technologies to provide more defense in depth within a single device.

A

Unified Threat Management