Cisco Intro Cybersecurity Ch.4 Flashcards

1
Q

port scanning

A

the process of probing a computer, server, or other network host for open ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

firewall

A

protects the network by controlling what traffic is allowed in, as well as allowed out

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

DDoS

A

This attack disrupts services by simply overwhelming servers and network devices with bogus traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

physical security

A

a type of security measure that restricts access to networking closets, server locations, as well as fire suppression

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

botnet

A

botnet can have tens of thousands of bots, or even hundreds of thousands.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Kill Chain

A

a conceptual outline of the stages of an information systems attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

IPS/IDS

A

a security appliance that has the ability to block or deny traffic based on a positive rule or a signature match

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

NetFlow

A

a tool used to gather information about data flowing through a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

IPS

A

Dedicated to intrusion prevention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

AMP

A

Comes in next generation devices and can also be installed as software in host computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

VPN

A

Designed for secure encrypted tunneling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Router

A

Has many capabilities besides just routing functions, including traffic filtering, encryption, and capabilities for secure encrypted tunneling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Firewall

A

Has all the capabilities of an ISR as well as advanced network management and analytics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Kill Chain Stage 1

A

Reconnaissance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Kill Chain Stage 2

A

Weaponization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Kill Chain Stage 3

A

Delivery

17
Q

Kill Chain Stage 4

A

Exploitation

18
Q

Kill Chain Stage 5

A

Installation

19
Q

Kill Chain Stage 6

A

Command and Control

20
Q

Kill Chain Stage 7

A

Action