Chapter 5 Key Terms Flashcards

1
Q

Security Zone

A

Portions of the network or system that have specific security concerns or requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Wireless network

A

A network that does not require a physical connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Guest network

A

A network that grants internet access only to guest users. A guest network has a firewall to regulate guest user access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Honeynet

A

A special zone or network created to trap potential attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Ad hoc

A

A decentralized network that allows connections without a traditional base station or router. It allows users to connect two or more devices directly to each other for a specific purpose.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Intranet Zone

A

A private network that employs internet information services for internal use only.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Internet

A

A public network that includes all publicly available web servers, FTP servers, and other services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Extranet

A

A privately-controlled network distinct from but located between the internet and a private LAN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Demilitarized zone

A

A network that contains publicly accessible resources and is located between the private network and an untrusted network, such as the internet. It is protected by a firewall.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Proxy server

A

A type of firewall that stands as an intermediary between clients requesting resources from other servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Internet content filter

A

Software used to monitor and restrict content delivered across the web to an end user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Network access control

A

Software that controls access to the network by not allowing computers to access network resources unless they meet certain predefined security requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

All-in-one security appliance

A

An appliance that combines many security functions into a single device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Application-aware devices

A

A device that has the ability to analyze and manage network traffic based on the application-layer protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Demilitarized zone (DMZ)

A

A buffer network (or subnet) that is located between a private network and an untrusted network, such as the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Bastion or Sacrificial Host

A

Any host that is exposed to attack and has been hardened or fortified against attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Screening router

A

The router that is most external to the network and closest to the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Duel-homed gateway

A

A firewall device that typically has three network interfaces. One interface connects to the internet, one interface connects to the public subnet, and one interface connects to the private network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Screened-host gateway

A

A device residing within the DMZ that requires users to authenticate in order to access resources within the DMZ or the intranet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Screened subnet

A

A subnet protected by two firewalls; an external firewall is connected to the internet and an internal firewall is connected to a private network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Network Address Translation

A

A method used by routers to translate multiple private IP addresses into a single registered IP address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Internal network

A

The private network where devices use private IP addresses to communicate with each other.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Internal address

A

The private IP address that is translated to an external IP address by NAT.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

External network

A

The public network that a NAT device connects to with a single public IP address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

External address

A

The public IP address that NAT uses to communicate with the external network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Port Address Translation (PAT)

A

An extension of NAT that associates a port number with a request from a private host.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Virtual Private Network

A

A remote access connection that uses encryption to securely send data over an untrusted network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Tunneling

A

Communication method that encrypts packet contents and encapsulates them for routing through a public network.

29
Q

Point-to-Point Tunneling Protocol (PPTP)

A

A early tunneling protocol developed by Microsoft.

30
Q

Layer 2 Forwarding (L2F)

A

A tunneling protocol developed by Cisco to establish virtual private network connections over the internet.

31
Q

Layer 2 Tunneling Protocol (L2TP)

A

An open standard for secure multi-protocol routing.

32
Q

Internet Protocol Security (IPsec)

A

A set of protocols that provides security for Internet Protocol (IP) can be used in conjunction with L2TP or to set up a VPN solution.

33
Q

Secure Sockets Layer (SSL)

A

A well-established protocol to secure IP protocols, such as HTTP and FTP.

34
Q

Transport Layer Security (TLS)

A

A protocol that evolved from SSL and provides privacy and data integrity between two communicating applications.

35
Q

Web Filter

A

A content filter that prevents users from visiting restricted websites.

36
Q

Web threat filter

A

A filter that prevents users from visiting websites with known malicious content.

37
Q

Spam

A

Irrelevant or inappropriate email sent to a large number of recipients.

38
Q

Spam filter

A

An email filter that prevents the delivery of irrelevant or inappropriate email known as spam.

39
Q

Anti-phishing software

A

Software that scans content to identify and dispose of phishing attempts.

40
Q

Network access control

A

A policy-driven control process that allows or denies network access to devices connecting to a network.

41
Q

Bring Your Own Device (BYOD)

A

A policy that allows an employee to use a personal device, such as a laptop computer or phone, to connect to the organization’s network to accomplish daily work tasks.

42
Q

Active attack

A

An attack in which perpetrators attempt to compromise or affect the operations of a system in some way.

43
Q

Passive attack

A

An attack in which perpetrators gather information without affecting the targeted network’s flow of information.

44
Q

External attack

A

An attack in which unauthorized individuals try to breach a network from outside the network.

45
Q

Inside attack

A

An attack initiated by authorized individuals inside the network’s security perimeter who attempt to access systems or resources to which they’re not authorized.

46
Q

Entry point

A

An entry point is a location or device that allows network access and is vulnerable to attacks.

47
Q

Network baseline

A

The network baseline is the normal network activity including typical traffic patterns, data usage, and server loads. Activity that deviates from the baseline can indicate an attack.

48
Q

Network segmentation

A

Network segmentation is the division of a network into smaller networks or pieces for performance or security reasons.

49
Q

Privilege escalation

A

A software bug or design flaw in an application that allows an attacker to gain access to system resources or additional privileges that aren’t typically available.

50
Q

Backdoor

A

An unprotected and usually lesser known access method or pathway that may allow attackers access to system resources.

51
Q

Zero-day vulnerability

A

A software vulnerability that is unknown to the vendor that can be exploited by attackers.

52
Q

Common Vulnerabilities and Exposures (CVEs)

A

A repository of vulnerabilities hosted by MITRE Corporation.

53
Q

Peer to peer software

A

Software that allows users to share content without centralized servers or centralized access control.

54
Q

Instant messaging

A

Real-time text messaging communication that supports picture, music, and document exchange.

55
Q

Virtual LAN (VLAN)

A

A logical grouping of computers based on switch port.

56
Q

MAC filtering/port security

A

A switch feature that restricts connection to a given port based on the MAC address.

57
Q

Port Authentication

A

A switch feature that follows the 802.1x protocol to allow only authenticated devices to connect.

58
Q

Content-addressable
memory (CAM) table

A

A table maintained by a switch that contains MAC addresses and their corresponding port locations.

59
Q

Dynamic Host Configuration protocol (DHCP) snooping

A

A security feature on some switches that filters out untrusted DHCP messages.

60
Q

Dynamic ARP
Inspection (DAI)

A

A security feature on some switches that verifies each ARP request has a valid IP to MAC binding.

61
Q

MAC flooding

A

An attack that overloads a switch’s MAC forwarding table to make the switch function like a hub.

62
Q

ARP spoofing

A

An attack in which the attacker’s MAC address is associated with the IP address of a target’s device.

63
Q

VLAN hopping

A

An attack in which the source MAC address is changed on frames sent by the attacker.

64
Q

Double tagging

A

An attack in which the source MAC address is changed on frames sent by the attacker.

65
Q

MAC spoofing

A

An attack in which the source MAC address is changed in the header of a frame.

66
Q

Dynamic Trunking
Protocol (DTP)

A

An unsecure protocol that could allow unauthorized devices to modify a switch’s configuration.

67
Q

Virtual LAN (VLAN)

A

A logical collection of devices that belong together and act as if they are connected to the same wire or physical switch.

68
Q

Router

A

A network device that transmits data from one network to another.

69
Q

Access control list (ACL)

A

A router filter that controls which network packets are permitted (forwarded) or denied (dropped) in or out of a network.