Chapter 2: Technologies and Tools Flashcards
- Both the _______ and _________ use ACLs to block traffic by port, protocol, or IP address.
Router, firewall
- Where the router or firewall has no allow rule for a particular type of traffic, the traffic is blocked by a technique called ________ ____.
Implicit deny
- When setting up IPSec across the internet, it is used in _________ mode but when it is used in the LAN between client and server or server to server, it is known as ___________ mode.
Tunnel, transport
- I have installed a _________ ________ is my DMZ so that it will decrypt incoming traffic so that my firewall or inline NIPS can __________ the traffic.
Reverse proxy, inspect
- If I disable the SSID on my wireless access point, it can be discovered by a ___________ _________ _________ as the SSID is included in the packet or an SSID _______ device.
Wireless packet sniffer, decloak
- The role of the VPN concentrator is to set up the _________ ________ before the exchange of data.
Secure tunnel
- _____ ___________ is used to prevent someone plugging a laptop into my network; however, ________ is used to prevent a rogue access point being plugged into my network as it authenticates the user or device itself.
Port security, 802.1x
- A __________ is a device that is used by cybersecurity administrators so that they can observe the attack method used by hackers. This will then enable them to prevent these types of attacks in the future.
Honeypot
- A security administrator has noticed in the SIEM system log files that an attack was detected on Server 1 but when they manually inspected the server, the attack was not shown; this is known as a ______ ___________.
False positive
- One of the reasons why a SIEM system records a false positive is because the wrong ______ _________ were being used, therefore it was monitoring the wrong type of attack.
Input filters
An ________ NIPS has traffic flowing through it; however, the NIDS is known as ________ and relies on sensors and collectors to discover new attacks.
Inline, passive
_________ __________ inspects traffic going to a website, whereas a _______ ________ inspects traffic across the network.
Banner Grabbing, packet sniffer
Banner grabbing uses tools such as Dimitri, _____, ________, and ________.
Nmap, telnet, and netcat
__________ shows established connections in a Windows environment, whereas _________ shows established connections in a Linux/Unix environment.
Netstat, netcat (nc)
A _____ system correlates security logs from various devices such as servers and firewalls. The security administrator has decided to store the logs into a _______ drive so that they can be read but not tampered with as they may be needed as evidence at a later date.
SIEM, WORM