Chapter 19 Terms and Topics Flashcards

1
Q

What is the purpose of an ACL?

A

To manage which traffic can access the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An authentication mechanism that provides protection for secure network access.

A

IEEE 802.1x

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Where not all traffic is routed via the VPN. Allows multiple connection paths, some via a protected route.

A

Split Tunnel VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Routes all traffic over the VPN, providing protection to all networking traffic.

A

Full Tunnel VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Security tool that helps protect web applications by filtering and monitoring HTTP traffic between a web application and the internet.

A

WAF [Web Application Firewall]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Network infrastructure that separates public and private functions into two distinct areas.

A

Screen Subnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What types of servers are placed within a screened subnet?

A

Web servers, remote access servers, and external email servers to name a few.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the purpose of a BPDU?

A

To detect loops in network topologies. It contains information regarding ports, switches, port priority and addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What functions does IPSec perform?

A

Encrypt application layer data. Provide security for routers sending routing data across the public internet. Provides authentication without encryption and protect network data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

TCP Port 20 for active transfers and Port 990 for implicit connections is used by

A

FTPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Set of technologies that work on a network to control traffic and ensure the performance of critical applications with limited network capacity.

A

QoS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Network data that flows within an enterprise network.

A

east-west traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Data flowing between the enterprise network or data center and the outside of the network.

A

north-south traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Operates forward requests to servers based on a variety of parameters.

A

Forward Proxy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Sits behind the firewall in a private network and forwards clients requests to the appropriate backend server.

A

Reverse Proxy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Hardware device that allows network traffic to flow between two end-points in a network without interruption.

A

TAP [Test Access point]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules.

A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

An information security system that provides a single point of protection against threats.

A

UTM [Unified Threat Management]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Network security device that combines traditional firewall capabilities with other network device filtering functions.

A

NGFW

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A method of mapping an IP address space into another by modifying network address information in the IP header of packets while they are in transit across a traffic routing device. It works by selecting gateways that sit between two local networks: the internal network and outside network. It reduces the need for IPv4 public addresses and hides private network address ranges.

A

NAT [Network Address Translation]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

An extension of NAT that permits multiple devise on a LAN to be mapped to a single public IP address to conserve IP addresses.

A

PAT [Port Address Translation]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A network that has the same functionality as the Internet for users but lies completely inside the trusted area of a network and is under the security control of the system and network administrators.

A

Intranet

23
Q

Extension of a selected portion of a company’s intranet to external partners.

A

Extranet

24
Q

A security measure that restrict unauthorized users and devices from accessing a corporate or private network.

A

NAC [Network Access Control]

25
Q

Code is stored on the host machine for activation and use at time of connection.

A

Agent-based NAC

26
Q

The code resides on the network and is deployed to memory for use in a machine requesting connections.

A

Agentless NAC

27
Q

Microsoft technology that controls network access of a computer based on its health.

A

NAP [Network Access Protection]

28
Q

Technology by Cisco for controlling network admissions.

A

Cisco NAC [Network Admission Control]

29
Q

Has TLS replaced SSL?

A

For the most part, yes. The term SSL will continue to be used for quite some time even though it’s referring to TLS.

30
Q

Compare and contrast dynamic learning, static learning and sticky learning port security

A

Dynamic learning allows the switch to learn MAC addresses when they connect. Static Learning is when a specific MAC address is assigned to a port. Sticky learning allows multiple devices to a port, but also stores the information in memory that persists through reboots.

31
Q

A technique used to prevent network loops and associated outages.

A

Loop Prevention

32
Q

An IT security process and technology that checks and analyzes the integrity of critical assets for signs of tampering or corruption.

A

Integrity Monitoring

33
Q

Process of sending multiple virtual local area networks over a single physical link or interface.

A

VLAN trunking

34
Q

The current version of the HTML protocol, which was developed to handle the modern web content of audio and video as well as to enhance the ability of a browser to function without add ins.

A

HTML5

35
Q

An intermediary device responsible for funneling traffic through firewalls using a supervised secure channel.

A

Jump Server

36
Q

Takes requests from a client system and forwards them to the destination server on behave of the client. Can be used to filter out undesirable traffic and prevent employees from accessing potentially hostile websites.

A

Proxy Server

37
Q

Scanning system that uses AI to detect intrusions and malicious traffic.

A

Heuristic-based scanning

38
Q

Uses a database of signatures for known vulnerabilities.

A

Signature-based scanning

39
Q

What is the purpose of an HSM?

A

To manage or store encryption keys.

40
Q

Having a security perimeter around the network.

A

Castle-and-moat mode

41
Q

A security module centered on the belief that you should not trust any request without certifying authentication and authorization.

A

Zero Trust Mode

42
Q

What is debsums command used for?

A

To scan for to config files and make sure their integrity are intact on the Linux OS.

43
Q

What is the sfc /scannow command used for?

A

To scan for file integrity in Windows OS.

44
Q

A logical implementation of a LAN and allows computers connected to different physical networks to act and communicate as if they were on the same network.

A

VLAN

45
Q

How do you configure VLANS?

A

By using a switch port.

46
Q

A mechanism that limits the lifespan or lifetime of data in a computer or network.

A

TTL [Time To Live]

47
Q

An access control method used to prevent unauthorized network access.

A

MAC Filtering

48
Q

When a single host is in communication to one server

A

Affinity-base Scheduling

49
Q

A device that distributes network or application traffic across a number of servers.

A

Load Balancer

50
Q

All servers get a request that is distributed evenly amongst them.

A

Round Robin

51
Q

If there is more than one DHCP server on the network, which DHCP server does the client use?

A

The one that reaches the client first.

52
Q

An Ethernet MAC bridges standard that includes bridging, Spanning Tree Protocol, and other details.

A

IEEE 802.1d

53
Q

A networking standard that supports virtual local area networking (VLANs) on an IEEE 802.3 Ethernet network

A

IEEE 802.1Q

54
Q

Provides rapid Spanning Tree reconfiguration capability for MAC bridges.

A

IEEE 802.1w