Defense Flashcards

1
Q

Patching

A

Corrects a known bug or vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Security Policy

A

Set of guidelines for network use.
Includes AUP, continually changing document
Governing Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

AUP

A

Appropriate Use Policy

Acceptable Use Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Vulnerability Scanner

A

Tests network for weakness

Nessus, Nmap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Honey Pot

A

Appears as an attractive target

Honey net - multiple honey pots

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

ACL

A

Access Control List

List of permitted / denied traffic for routers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Root Guard

A

Prevents another switch in STP from becoming the root

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

BPDU Guard

A

Identifies rogue switches in STP topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Flood Guard

A

In STP, prevents flooding frames from causing a DoS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Software firewall

A

Firewall software to protect the computer it is running on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Hardware Firewall

A

Network appliance that acts as a firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Packet-Filtering Firewall

A

Filters traffic based on ACL-like rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Stateful Firewall

A

Inspects traffic leaving the network, compares it to incoming traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Firewall Zones

A

There can be different rules for each zone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

UTM Firewalls

A

Unified Threat Management Firewalls

Bundles multiple security functions ins a single device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Signature-Based Detection

A

Primary method of detection for IDS/IPS

Signature files need to be updated

17
Q

Policy-Based Detection

A

Detection method for IDS/IPS

Based on specific declarations or identifying unsecure protocols.

18
Q

Anomaly-Based Detection

A

Detection method for IDS/IPS

Prone to false positives

19
Q

Statistical Anomaly Detection

A

Form of Anomaly-Based Detection

Watches network traffic and builds a baseline

20
Q

Nonstatistical Anomaly Detection

A

Form of Anomaly-Based Detection

Admin states what traffic should be. More prone to false positives.

21
Q

NIPS

A

Network Intrusion Prevention System

22
Q

HIPS

A

Host Intrusion Prevention System