Chapter 5 - Network Security Flashcards

1
Q

How does the first layer control access to the network?

A
  • Anti virus software.
  • Firewalls.
  • Intrusion detection system.
  • Virtual private networking.
  • Denial of service protection.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How does the 2nd later verify user access to a network?

A
  • Username / password.
  • Password synchronization.
  • Public key infrastructure.
  • Tokens.
  • Biometrics.
  • Single-sign-on.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How does the 3rd later give rights to a user on a network?

A
  • User / group permission.
  • Enterprise Directories.
  • Enterprise user administration.
  • Rules based access control.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

3 layers of network security

A
  1. Network layer security or perimeter security (control access to network)
  2. Proof of identity or authentication (verify identity of user accessing network)
  3. User permission on network or system based on identity / authorization (what user can do once authenticated and granted network access)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly