Chapter 6 - Network Security Devices, Design, And Technology Flashcards

1
Q

Bridge

A

A hardware device or software that is used to join two separate computer networks to enable communication between them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Switch

A

A device that connects network segments and forwards only frames intended for that specific device or frames sent to all devices.

Operates at data link layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Loop prevention

A

A means to mitigate broadcast storms using the IEEE 802.1d standard spanning-tree algorithm (STA).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

MAC flooding attack

A

Overflowing the switch with Ethernet frames that have been spoofed so that each frame contains a different source MAC address each appearing to come from a different computer. This consumes all the memory for the MAC address table. Once full, the switch enters fail-open mode and functions like a network hub.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Flood guard

A

A defense against a MAC flooding attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Port security

A

A flood guard technology that restricts the number of incoming MAC addresses for a port.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Router

A

A device that can forward packets across computer networks.

Operates at network layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Access Control List (ACL)

A

A set of rules to permit or restrict data from flowing into or out of a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Antispoofing

A

A defense used to protect against IP spoofing that imitates another computer’s IP address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Load balancing

A

A technology that can help to evenly distribute work across a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Load balancer

A

A dedicated network device that can direct requests to different servers based on a variety of factors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Round-robin

A

A scheduling protocol rotation that applies to all devices equally.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Affinity

A

A scheduling protocol that distributes the load based on which devices can handle the load more efficiently.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Active-passive configuration

A

A confirmation in which the primary load balancer distributed the network traffic to the most suitable server while the secondary load balancer operates in a “listening mode”.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Active-active configuration

A

A configuration in which all load balancer are always active.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Forward proxy

A

A computer or an application program that intercepts user requests from the internal secure network and then processes those requests on behalf to f the users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Application/multipurpose proxy

A

A special proxy server that “knows” the application protocols that it supports.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Reverse proxy

A

A proxy that routes requests coming from an external network to the correct internal server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Transparent proxy

A

A proxy that does not require any configuration in the users computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Firewall

A

Hardware or software that is designed to limit the spread of malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Host-based firewall

A

A software firewall that runs as a program on the local computer to block or filter traffic coming into and out of the computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Implicit deny

A

The principle of being always blocked by default.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Network-based firewall

A

A firewall that functions at the OSI Network layer (Layer 3).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Stateless packet filtering

A

A firewall that looks at the incoming packet and permits or denies it based on the conditions that have been set by the administrator.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Stateful packet filtering

A

A firewall that keeps a record of the state of a connection between an internal computer and an external device and then makes decisions based on the connection as well as the conditions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Application-based firewall

A

A firewall that functions at the OSI application layer (layer 7).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Web application firewall

A

A firewall that filters by examining the applications using HTTP.

28
Q

Virtual private network (VPN)

A

A technology that enables use of an unsecured public network as if it were secure private network.

29
Q

Remote access VPN

A

A user-to-LAN VPN connection used by remote users.

30
Q

Site-to-site VPN

A

A VPN connection in which multiple sites can connect to other sites over the internet.

31
Q

Always-on VPN

A

A VPN that allows the user to always stay connected instead of connecting and disconnecting from it.

32
Q

VPN concentrator

A

A device that aggregates hundreds or thousands of VPN connections.

33
Q

Full tunnel

A

A VPN technology in which all traffic is sent to the VPN concentrator and is protected.

34
Q

Split tunneling

A

A VPN technology in which only some traffic is sent to the VPN concentrator and is protected while other traffic directly accesses the internet.

35
Q

SMTP

A

Simple mail transfer protocol email system that handles outgoing mail.

36
Q

POP3

A

An earlier mail system responsible for incoming mail.

37
Q

IMAP (Internet Mail Access Protocol)

A

A more recent and advanced electronic email system for incoming mail.

38
Q

Mail gateway

A

A system that monitors emails for unwanted content and prevents these messages from being delivered.

39
Q

Intrusion detection system (IDS)

A

A device that detects an attack as it occurs.

40
Q

Inline IDS

A

An IDS that is directly connected to the network and monitors the flow of data as it occurs.

41
Q

Passive IDS

A

An IDS that is connected to a port on a switch in which data is fed to it.

42
Q

In-band

A

An IDS implemented through the network itself by using network protocols and tools.

43
Q

Out-of-band

A

An IDS that uses an independent and dedicated channel to reach the device.

44
Q

Anomaly monitoring

A

A monitoring technique used by an intrusion detection system (IDS) that creates a baseline of normal activities and compares actions against the baseline. Whenever there is a significant deviation from this baseline, an alarm is raised.

45
Q

False positives

A

Alarm that is raised when there is no actual abnormal behavior.

46
Q

False negative

A

The failure to raise an alarm when there is abnormal behavior.

47
Q

Signature-based monitoring

A

A monitoring technique used by an intrusion detection system (IDS) that examines network traffic to look for well-known patterns and compares the activities against a predefined signature.

48
Q

Behavioral monitoring

A

A monitoring technique used by an IDS that uses the normal processes and actions as the standard and compares actions against it.

49
Q

Heuristic monitoring

A

A monitoring technique used by an IDS that uses an algorithm to determine if a threat exists.

50
Q

Two types of IDS that exist

A

1) host-based intrusion detection system (HIDS)

2) network intrusion detection system (NIDS)

51
Q

Host-based intrusion detection system (HIDS)

A

A software based application that runs on a local host computer than can detect an attack as it occurs.

52
Q

Network intrusion detection system (NIDS)

A

A technology that watches for attacks on the network and reports back to a central device.

53
Q

Intrusion prevention system (IPS)

A

Not only monitors to detect malicious activities like an IDS, but also attempt to prevent them by stopping the attack.

54
Q

Network intrusion prevention system (NIPS)

A

A technology that monitors network traffic to immediately react to block a malicious attack.

55
Q

Host-based intrusion prevention system (HIPS)

A

A technology that monitors a local system to immediately react to block a malicious attack.

56
Q

Security and information event management (SIEM)

A

A product that consolidates real-time monitoring and management of security information with analysis and reporting of security events.

57
Q

Demilitarized zone (DMZ)

A

A separate network that rests outside the secure network perimeter: untrusted outside users can access the DMZ but cannot enter the secure network.

58
Q

Network address translation (NAT)

A

A technique that allows private IP addresses to be used on the public internet.

59
Q

Physical network segregation

A

Isolating the network so that it is not accessible by outsiders.

60
Q

Air gap

A

The absence of any type of connection between devices.

61
Q

Virtual lan (VLAN)

A

A technology that allows scattered users to be logically grouped together even though they may be attached to different switches.

62
Q

Network access control (NAC)

A

A technique that examines the current state of a system or network device before it can connect to the network.

63
Q

Host agent health checks

A

Reports sent by network access control (NAC) “agents” installed on devices to gather information and report back to the NAC device.

64
Q

Permanent NAC agent

A

A network access control (NAC) agent that resides on end devices until uninstalled.

65
Q

Dissolvable NAC agent

A

A network access control (NAC) agent that disappears after reporting information to the NAC device.

66
Q

Agentless NAC

A

A network access control (NAC) agent that is not installed on an endpoint device but is embedded within a Microsoft Windows active directory domain controller

67
Q

Data loss prevention (DLP)

A

A system of security tools that is used to recognize and identify data that is critical to the organization and ensure that it is protected.