Chapter 15 Student 12 Flashcards

1
Q

You see your boss install a program on his computer. You see that he starts it up via the command line. The program performs a port scan, and also looks for things like missing security patches, common passwords, etc. At the end he also performs a DOS attack just to see how our network copes with the attack. What program is your boss using? Pg 551

A

Nessus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

This program was created to identify devices on the network and to create a network diagram. It also can do port scanning, and identify operating systems. What is the name of the program? Pg 552

A

NMAP or Network Mapper

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

These devices perform: network firewalling, network intrusion prevention, gateway antivirus, gateway spam, VPN, content filtering, and much more. What is the name of the device? Pg 552

A

Unified Threat Management or UTM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

At your job, the server room is in an area where anyone can have access to it. While your manager sees nothing wrong, you tell him that the area needs to be secure and only certain I people should have access to it. You tell him that locks on the doors, a camera, and locks on the servers are the _________ ________ we need to improve our _________ _________. Pg 554-555

A

Physical Barriers, physical security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

One physical barrier is a series of two doors with a small room between them. Usually you need some type of authentication to get through the first door and a different type to get through the second door. This is called what? Pg 556

A

Man traps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Analog closed circuit television, or IP cameras could be used to monitor secure areas. These are an example of what? Pg 556

A

Video Monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

One very good way of using door access controls is by having a device that can read a card from a short distance and will control access to sensitive rooms. These devices log all entry and exit times. Also the card will be associated with your credentials. This type of device called what? Pg 557

A

Proximity Reader

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

This device can support multi factor authentication. It’s a small hardware device with built in authentication mechanisms. The mechanisms control access. What is this device called? Pg 557

A

Key Fob

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

You are in charge of putting together a system that will act like a regular server going to the Internet. Its job is to get attacked so an IDS can log and pinpoint where the attack is coming from. What are you building? Pg 550

A

Honeypot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly