Chapter 2: Technologies and Tools Flashcards

1
Q
  1. Both the _______ and _________ use ACLs to block traffic by port, protocol, or IP address.
A

Router, firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. Where the router or firewall has no allow rule for a particular type of traffic, the traffic is blocked by a technique called ________ ____.
A

Implicit deny

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. When setting up IPSec across the internet, it is used in _________ mode but when it is used in the LAN between client and server or server to server, it is known as ___________ mode.
A

Tunnel, transport

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. I have installed a _________ ________ is my DMZ so that it will decrypt incoming traffic so that my firewall or inline NIPS can __________ the traffic.
A

Reverse proxy, inspect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. If I disable the SSID on my wireless access point, it can be discovered by a ___________ _________ _________ as the SSID is included in the packet or an SSID _______ device.
A

Wireless packet sniffer, decloak

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. The role of the VPN concentrator is to set up the _________ ________ before the exchange of data.
A

Secure tunnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. _____ ___________ is used to prevent someone plugging a laptop into my network; however, ________ is used to prevent a rogue access point being plugged into my network as it authenticates the user or device itself.
A

Port security, 802.1x

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. A __________ is a device that is used by cybersecurity administrators so that they can observe the attack method used by hackers. This will then enable them to prevent these types of attacks in the future.
A

Honeypot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. A security administrator has noticed in the SIEM system log files that an attack was detected on Server 1 but when they manually inspected the server, the attack was not shown; this is known as a ______ ___________.
A

False positive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. One of the reasons why a SIEM system records a false positive is because the wrong ______ _________ were being used, therefore it was monitoring the wrong type of attack.
A

Input filters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

An ________ NIPS has traffic flowing through it; however, the NIDS is known as ________ and relies on sensors and collectors to discover new attacks.

A

Inline, passive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

_________ __________ inspects traffic going to a website, whereas a _______ ________ inspects traffic across the network.

A

Banner Grabbing, packet sniffer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Banner grabbing uses tools such as Dimitri, _____, ________, and ________.

A

Nmap, telnet, and netcat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

__________ shows established connections in a Windows environment, whereas _________ shows established connections in a Linux/Unix environment.

A

Netstat, netcat (nc)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A _____ system correlates security logs from various devices such as servers and firewalls. The security administrator has decided to store the logs into a _______ drive so that they can be read but not tampered with as they may be needed as evidence at a later date.

A

SIEM, WORM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A company could use a ____-__-____ VPN instead of an expensive lease line or even more expensive dark fiber, but it must be set to _______ - ___ mode.

A

Site-to-site, always-on

17
Q

A _____ ________ could be used as a spam filter and a ____ solution to prevent PII and sensitive information from leaving the company.

A

Mail gateway, DLP

18
Q

Both ____ and a ______ can detect when new hosts have been added to your internal network.

A

Nmap, NIDS

19
Q

A __________-______ NIDS/NIPS uses a known database and is reliant on regular updates where _______- _____ NIDS/NIPS start with a known database but can identify new variants.

A

Signature-based, anomaly-based

20
Q

A security administrator changes the default _________ and _________, disables the SSID, and enables ______ filtering to make a wireless access point more secure.

A

Username, password, MAC