Chapter 19 Terms and Topics Flashcards

1
Q

What is the purpose of an ACL?

A

To manage which traffic can access the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An authentication mechanism that provides protection for secure network access.

A

IEEE 802.1x

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Where not all traffic is routed via the VPN. Allows multiple connection paths, some via a protected route.

A

Split Tunnel VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Routes all traffic over the VPN, providing protection to all networking traffic.

A

Full Tunnel VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Security tool that helps protect web applications by filtering and monitoring HTTP traffic between a web application and the internet.

A

WAF [Web Application Firewall]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Network infrastructure that separates public and private functions into two distinct areas.

A

Screen Subnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What types of servers are placed within a screened subnet?

A

Web servers, remote access servers, and external email servers to name a few.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the purpose of a BPDU?

A

To detect loops in network topologies. It contains information regarding ports, switches, port priority and addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What functions does IPSec perform?

A

Encrypt application layer data. Provide security for routers sending routing data across the public internet. Provides authentication without encryption and protect network data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

TCP Port 20 for active transfers and Port 990 for implicit connections is used by

A

FTPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Set of technologies that work on a network to control traffic and ensure the performance of critical applications with limited network capacity.

A

QoS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Network data that flows within an enterprise network.

A

east-west traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Data flowing between the enterprise network or data center and the outside of the network.

A

north-south traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Operates forward requests to servers based on a variety of parameters.

A

Forward Proxy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Sits behind the firewall in a private network and forwards clients requests to the appropriate backend server.

A

Reverse Proxy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Hardware device that allows network traffic to flow between two end-points in a network without interruption.

A

TAP [Test Access point]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules.

A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

An information security system that provides a single point of protection against threats.

A

UTM [Unified Threat Management]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Network security device that combines traditional firewall capabilities with other network device filtering functions.

A

NGFW

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A method of mapping an IP address space into another by modifying network address information in the IP header of packets while they are in transit across a traffic routing device. It works by selecting gateways that sit between two local networks: the internal network and outside network. It reduces the need for IPv4 public addresses and hides private network address ranges.

A

NAT [Network Address Translation]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

An extension of NAT that permits multiple devise on a LAN to be mapped to a single public IP address to conserve IP addresses.

A

PAT [Port Address Translation]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A network that has the same functionality as the Internet for users but lies completely inside the trusted area of a network and is under the security control of the system and network administrators.

23
Q

Extension of a selected portion of a company’s intranet to external partners.

24
Q

A security measure that restrict unauthorized users and devices from accessing a corporate or private network.

A

NAC [Network Access Control]

25
Code is stored on the host machine for activation and use at time of connection.
Agent-based NAC
26
The code resides on the network and is deployed to memory for use in a machine requesting connections.
Agentless NAC
27
Microsoft technology that controls network access of a computer based on its health.
NAP [Network Access Protection]
28
Technology by Cisco for controlling network admissions.
Cisco NAC [Network Admission Control]
29
Has TLS replaced SSL?
For the most part, yes. The term SSL will continue to be used for quite some time even though it’s referring to TLS.
30
Compare and contrast dynamic learning, static learning and sticky learning port security
Dynamic learning allows the switch to learn MAC addresses when they connect. Static Learning is when a specific MAC address is assigned to a port. Sticky learning allows multiple devices to a port, but also stores the information in memory that persists through reboots.
31
A technique used to prevent network loops and associated outages.
Loop Prevention
32
An IT security process and technology that checks and analyzes the integrity of critical assets for signs of tampering or corruption.
Integrity Monitoring
33
Process of sending multiple virtual local area networks over a single physical link or interface.
VLAN trunking
34
The current version of the HTML protocol, which was developed to handle the modern web content of audio and video as well as to enhance the ability of a browser to function without add ins.
HTML5
35
An intermediary device responsible for funneling traffic through firewalls using a supervised secure channel.
Jump Server
36
Takes requests from a client system and forwards them to the destination server on behave of the client. Can be used to filter out undesirable traffic and prevent employees from accessing potentially hostile websites.
Proxy Server
37
Scanning system that uses AI to detect intrusions and malicious traffic.
Heuristic-based scanning
38
Uses a database of signatures for known vulnerabilities.
Signature-based scanning
39
What is the purpose of an HSM?
To manage or store encryption keys.
40
Having a security perimeter around the network.
Castle-and-moat mode
41
A security module centered on the belief that you should not trust any request without certifying authentication and authorization.
Zero Trust Mode
42
What is debsums command used for?
To scan for to config files and make sure their integrity are intact on the Linux OS.
43
What is the sfc /scannow command used for?
To scan for file integrity in Windows OS.
44
A logical implementation of a LAN and allows computers connected to different physical networks to act and communicate as if they were on the same network.
VLAN
45
How do you configure VLANS?
By using a switch port.
46
A mechanism that limits the lifespan or lifetime of data in a computer or network.
TTL [Time To Live]
47
An access control method used to prevent unauthorized network access.
MAC Filtering
48
When a single host is in communication to one server
Affinity-base Scheduling
49
A device that distributes network or application traffic across a number of servers.
Load Balancer
50
All servers get a request that is distributed evenly amongst them.
Round Robin
51
If there is more than one DHCP server on the network, which DHCP server does the client use?
The one that reaches the client first.
52
An Ethernet MAC bridges standard that includes bridging, Spanning Tree Protocol, and other details.
IEEE 802.1d
53
A networking standard that supports virtual local area networking (VLANs) on an IEEE 802.3 Ethernet network
IEEE 802.1Q
54
Provides rapid Spanning Tree reconfiguration capability for MAC bridges.
IEEE 802.1w