Chapter 2 Monitoring and Diagnosing Networks Flashcards

1
Q

Application Log

A

contains carious events logged by applications or progarams

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Security Log

A

logs successful and unsuccessful log on attempts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Hardening

A

applied to operating systems. Lock down, the operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

File and print services

A

Primary vulnerable to denial of service (DOS) and access attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Services

A

Are programs that run when the operating system boots and are often running in the background

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Networks with PC-Based Systems

A

make sure that NetBIOS services are disabled on servers or that an effective firewall is in place between the server and the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Directory sharing

A

should be limited to what is essential to performing systems functions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Performance Monitor

A

used to examine activity on any computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Patch

A

update to a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

File Systems

A

FAT- designed for relatively small disk drives/ allows only two types of protection share level and user level
NTFS- files. directories and volumes can each have their own security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

802.1x

A

port based security for wireless network access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Security Audits

A

an integral part of continuous security needs and budget

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Alarms

A

indications of an ongoing current problem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Alerts

A

Issues to which you need to pay attention to

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Trends

A

threats that are fashionably used/ fads

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Honeypot

A

a computer that has been designated as a target for computer attacks.

17
Q

Enticement

A

the process of luring someone into your plan or trap

18
Q

Entrapment

A

the process in which a law enforcement officer or a government agent encourages or induces a person to commit a crime

19
Q

Rouge Machine

A

an intruder/unauthorized machine in the network

20
Q

Remediation Policy

A

When a gap in the security posture can be an opening for security risk

21
Q

Promiscuous Mode

A

PC and network card must be in this mode for network monitoring

22
Q

Sniffer

A

monitors network traffic and displays traffic in real time

23
Q

ipconfig /all

A

Command to find MAC addresses for windows based machine

24
Q

ifconfig /all

A

Command to find Mac addresses for Linux based machine