Chapter 7 - Administering A Secure Network Flashcards

1
Q

Simple network management protocol (SNMP)

A

A TCP/IP protocol that exchanges management information between networked devices. It allows network administrators to remotely monitor, manage, and configure devices in the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Domain name system security extensions (DNSSEC)

A

An extension to DNS that adds additional resource records and message header information, used to verify that DNS data has not been altered in transmission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

File transfer protocol (FTP)

A

An unsecure TCP/IP protocol that is commonly used for transferring files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

FTP Secure (FTPS)

A

A TCP/IP protocol that uses Secure Sockets Layer or Transport Layer Security to encrypt commands sent over the control port (port 21) in an FTP session.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Secure FTP (SFTP)

A

A secure TCP/IP protocol that is used for transporting files by encrypting and compressing all data and commands.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

SSL/TLS accelerator

A

A separate hardware card that inserts into a web server that contains one or more co-processors to handle SSL/TLS processing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Port mirroring

A

A facility that allows the administrator to configure a switch to copy traffic that occurs on some or all ports to a designated monitoring port on the switch.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Network tap (test access point)

A

A separate device that can be installed on the network for monitoring traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Aggregation switch

A

A device used to combine multiple network connections with not a single link.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Correlation engine

A

A device that aggregates and correlates content from different sources to uncover an attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

DDoS mitigator

A

A hardware device that identifies and blocks real-time distributed denial of service (DDoS) attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Log

A

A record of events that occur.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Data execution prevention (DEP)

A

A Microsoft Windows feature that prevents attackers from using buffer overflow to execute malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

File integrity check (FIC)

A

A service that can monitor any changes made to computer files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Application whitelisting

A

An inventory of applications and associated components (libraries, configuration files, etc.) that have been pre-approved and authorized to be active and present in the device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Removable media control

A

Tools that can be used to restrict which removable media, such as USB flash drives, can be attached to a system.

17
Q

Advanced malware management

A

A third-party service that monitors a network for any unusual activity.

18
Q

Virtualization

A

A means of managing and presenting computer resources by function without regard to their physical layout or location.

19
Q

Hypervisor

A

Software that manages virtual machine operating systems.

20
Q

Type I hypervisor

A

A virtual machine management program that runs directly on the computer’s hardware instead of the host operating system.

21
Q

Type II hypervisor

A

A virtual machine management program that runs on the host operating system.

22
Q

Container (or application cell)

A

A virtualization environment that holds only the necessary operating system components (such as binary files and libraries) that are needed for a specific application to run.

23
Q

Virtual desktop infrastructure (VDI)

A

The process of running a user desktop inside a virtual machine that resides on a server for storing sensitive applications and data on a remote server that is accessed through a smartphone.

24
Q

Virtual distributed Ethernet (VDE)

A

An Ethernet-compliant virtual network that can connect physical computers and/or virtual machines together.

25
Q

Virtual machine escape protection

A

A security protection that prevents a virtual machine from directly interacting with the host operating system.

26
Q

Virtual machine sprawl

A

The widespread proliferation of virtual machines without proper oversight or management.

27
Q

Cloud computing

A

A pay-per-use computing model in which customers pay only for the online computing resources that they need, and the resources can be easily scaled.

28
Q

Public cloud

A

A cloud in which the services and infrastructure are offered to all users with access provided remotely through the internet.

29
Q

Community cloud

A

A cloud that is open only to specific organizations that have common concerns.

30
Q

Private cloud

A

A cloud that is created and maintained on a private network.

31
Q

Hybrid cloud

A

A combination of public and private clouds.

32
Q

Cloud storage

A

A cloud system that has no computational capabilities but provides remote file storage.

33
Q

Software as a service (SaaS)

A

A model of cloud computing in which the vendor provides access to the vendors software applications running on a cloud infrastructure.

34
Q

Platform as a service (PaaS)

A

A cloud service in which consumers can install and run their own specialized applications on the cloud computing network.

35
Q

Infrastructure as a service (IaaS)

A

A cloud computing model in which customers have the highest level of control and can deploy and run their own software.

36
Q

Security as a service (SECaaS)

A

A cloud model in which all security services are delivered from the cloud to the enterprise.

37
Q

Cloud access security broker (CASB)

A

A set of software tools or services that resides between the enterprises’ on premises infrastructure and the cloud providers infrastructure to ensure that the security policies of the enterprise extend to their data in the cloud.

38
Q

Software defined network (SDN)

A

Software that virtualizes part of the physical network so that it can be more quickly and easily reconfigured.