Chapter 6 Flashcards

1
Q

a set of rules to permit or restrict data from flowing into or out of a network

A

access control list (ACL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

a configuration in which all load balancers are always active

A

active-active

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

a configuration in which the primary load balancer distributes the network traffic to the most suitable server while the secondary load balancer operates in a “listening mode.”

A

active-passive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

a scheduling protocol that distributes the load based on which devices can handle the load more efficiently.

A

affinity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

a network access control (NAC) agent that is not installed on an endpoint device but is embedded within a microsoft windows active directory domain controller

A

agentless NAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

the absence of any type of connection between devices.

A

air gap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A VPN that allows the user to always stay connected instead of connecting and disconnecting from it.

A

always-on VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

a monitoring technique used by an intrusion detection system (IDS) that creates a baseline of normal activities and compares actions against the baseline. Whenever there is a significant deviation from this baseline, an alarm is raised.

A

anomaly monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A defense used to protect against IP spoofing that imitates another computer’s IP address.

A

antispoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A special proxy server that “knows” the application protocols that is supports.

A

application/multipurpose proxy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

a firewall that functions at the OSI application layer

A

application-based firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A monitoring technique used by an intrusion detection system (IDS) that uses the normal processes and actions as the standard and compares actions against it.

A

behavioral monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A hardware device or software that is used to join two separate computer networks to enable communication between them.

A

bridge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A system of security tools that is used to recognize and identify data that is critical to the organization and ensure that it is protected.

A

data loss prevention (DLP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A separate network that rests outside the secure network perimeter: untrusted outside users can access the DMZ but cannot enter the secure network.

A

demilitarized zone (DMZ)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A network access control (NAC agent that disappears after reporting information to the NAC device.

A

dissolvable NAC agent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A private network that can also be accessed by authorized external customers, vendors, and partners.

A

extranet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

the failure to raise an alarm when there is abnormal behavior

A

false negative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

alarm that is raised when there is no actual abnormal behavior.

A

false positive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

hardware or software that is designed to limit the spread of malware.

A

firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A defense against a MAC flooding attack. see also port security.

A

flood guard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

a computer or an application program that intercepts user requests from the from the internal secure network and then processes those requests on behalf of the users.

A

forward proxy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A VPN technology in which all traffic is sent to the VPN concentrator and is protected.

A

full tunnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A separate open network that anyone can access without prior authorization.

A

guest network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

A dedicated cryptographic processor that provides protection for cryptographic keys.

A

hardware security module (HSM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

A monitoring technique used by an intrusion detection system (IDS) that uses an algorithm to determine if a threat exists.

A

heuristic monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Reports sent by network access control (NAC) “agents” installed on devices to gather information and report back to the NAC device

A

host agent health checks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

A software firewall that runs as a program on a local computer to block or filter traffic coming into and out of the computer.

A

host-based firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

A software-based application that runs on a local host computer that can detect an attack as it occurs.

A

host-based intrusion detection system (HIDS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

A technology that monitors a local system to immediately react to block a malicious attack.

A

host-based intrusion prevention system (HIPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

a more recent and advanced electronic email system for incoming mail.

A

IMAP ( internet mail access protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

the principle of being always blocked by default.

A

implicit deny

33
Q

an intrusion detection system (IDS) implemented through the network itself by using network protocols and tools.

A

in-band IDS

34
Q

an intrusion detection system (IDS) that is directly connected to the network and monitors the flow of data as it occurs

A

inline IDS

35
Q

a private network that belongs to an organization that can only be accessed by approved internal users.

A

intranet

36
Q

a device that detects an attack as it occurs.

A

Intrusion detection system (IDS)

37
Q

a dedicated network device that can direct requests to different servers based on a variety of factors.

A

load balancer

38
Q

a means to mitigate broadcast storms using the IEEE 802.1d standard spanning-tree algorithm (STA)

A

loop prevention

39
Q

A system that monitors emails for unwanted content and prevents these messages from being delivered.

A

mail gateway

40
Q

A device that converts media data from one format to another.

A

media gateway

41
Q

A technique that examines the current state of a system or network device before it can connect to the network.

A

network access control (NAC)

42
Q

a technique that allows private IP addresses to be used on the public internet.

A

network address translation (NAT)

43
Q

A technology that watches for attacks on the network and reports back to a central device.

A

network intrusion detection system (NIDS)

44
Q

A technology that monitors network traffic to immediately react to block a malicious attack.

A

prevention system (NIPS)

45
Q

a firewall that functions at the OSI network layer (Layer 3)

A

network-based firewall

46
Q

An intrusion detection system (IDS) that uses an independent and dedicated channel to reach the device.

A

out-of-band IDS

47
Q

An intrusion detection system (IDS) that is connected to a port on a switch in which data is fed to it.

A

passive IDS

48
Q

A network access control (NAC) agent that resides on end devices until uninstalled.

A

permanent NAC agent

49
Q

Isolating the network so that it is not accessible by outsiders.

A

physical network segregation

50
Q

a flood guard technology that restricts the number of incoming MAC addresses for a port

A

port security

51
Q

an earlier mail system responsible for incoming mail.

A

post office protocol (POP)

52
Q

A user-to-LAN VPN connection used by remote users.

A

remote access VPN

53
Q

A proxy that routes requests coming from an external network to the correct internal server.

A

reverse proxy

54
Q

a scheduling protocol rotation that applies to all devices equally

A

round-robin

55
Q

a device that can forward packets across computer networks.

A

router

56
Q

A product that consolidates real-time monitoring and management of security information with analysis and reporting of security events.

A

security and information event management (SIEM)

57
Q

a SIEM feature that combines data from multiple data sources (network security devices, servers, software applications, etc.) to build a comprehensive picture of attacks.

A

SIEM aggregation

58
Q

A SIEM feature that can inform security personnel of critical issures that need immediate attention.

A

SIEM automated alerting and triggers

59
Q

A SIEM feature that searches the data acquired through SIEM aggregation to look for common characteristics, such as multiple attacks coming from a specific source.

A

SIEM correlation

60
Q

A SIEM feature that can help filter the multiple alerts into a single alarm.

A

SIEM event duplication

61
Q

A SIEM feature that records events to be retrained for future analysis and to show that the enterprise has complied with regulations.

A

SIEM logs

62
Q

A SIEM feature that can show the order of the events.

A

SIEM time synchronization

63
Q

A monitoring technique used by an intrusion detection system (IDS) that examines network traffic to look for well-known patterns and compares the activities against a predefined signature.

A

signature-based monitoring

64
Q

an earlier email system that handles outgoing mail.

A

simple mail transfer protocol (SMTP)

65
Q

A VPN connection in which multiple sites can connect to others sites over the internet

A

site-to-site VPN

66
Q

a VPN technology in which only some traffic is sent to the VPN concentrator and is protected while other traffic directly access the internet.

A

split tunneling

67
Q

a spearate device that decrypts SSL traffic

A

SSL decryptor

68
Q

a separate hardware card thatinserts into a web server that contains one or more co-processors to andle SSL/TLS processing

A

SSL/TLS accelerator

69
Q

a firewall that keeps a record of the state of a connection between an internal computer and an external device and then makes decisions based on the connection as well as the conditions

A

stateful packet filtering

70
Q

a firewall that looks at the incoming packet and permits or denies it based on the conditions that have been set by the administraitor

A

stateless packet filtering

71
Q

a device that connects network segments and forwards only frames intended for that specific device or frames sent to all devices.

A

switch

72
Q

a proxy that does not require any configurathion on the user’s comuter

A

transparent proxy

73
Q

an integrated device that combines several security functions

A

Unified Threat management (UTM)

74
Q

a data loss prevention (DLP) technique for blocking the copying of files to a USB flash drive

A

USB blocking

75
Q

An IP address and a specific port number that can be used to reference different physical servers.

A

virtual IP (VIP)

76
Q

a technology that allows scattered users to be logically grouped together ever though they may be attached to different switches.

A

virtual LAN (VLAN)

77
Q

A technology that enables use of an unsecured public network as if it were a secure private network.

A

virtual private network (VPN)

78
Q

a device that aggregates hundreds of thousands of VPN connections.

A

VPN conentrator

79
Q

a firewall that filters by examining the applications using HTTP.

A

web application firewall