IS3220 CHAPTER 11 Flashcards

1
Q

The ability for a network or system user to remain unknown is called ___?
A number of tools and techniques provide this when connected to a network, although the underlying network protocols make true ___ very difficult.

A

ANONYMITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Keeping information about a network or system user from being disclosed to unauthorized entities. While typically focused on private information like Social Security number, medical records, credit card number, cell phone number, etc., these concerns extend to any data that represents personally identifiable information (AKA PII). This is called ___?

A

PRIVACY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An industry term referring to any product that appears in a vendor’s PowerPoint slide deck, but is not yet available in one of its products is called ___?

A

SLIDEWARE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A method of proving identity using two different authentication factors. These factors are something you know, something you have, or something you are. EX: a smart card (you have) with a PIN (something you know), a biometric device (something you are) or a proximity card (something you have) that activates a fingerprint reader (something you are. This is called ___?

A

TWO-FACTOR AUTHENTICATION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The technology and business processes used to identify, track, and mitigate known weaknesses on hosts within a computing environment is called ___?

A

VULNERABILITY MANAGEMENT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. Which response contains the three most common VPN deployment architectures?
  2. Bypass, encrypted, Open VPN
  3. DMZ, Open VPN, internally connected
  4. DMZ, Encrypted, Open VPN
  5. Encrypted, Open VPN, internally connected
  6. Bypass, DMZ, internally connected
A

Bypass, DMZ, internally connected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. All the following are considered VPN management best practices except:
  2. If one is good, two is better
  3. Patch regularly
  4. Permit split tunnelling
  5. Do not allow employee-owned computers to connect
  6. Review usage
A

Permit split tunnelling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. Three of the threats common to both software and hardware VPNs include ___, ___, ___.
A
Three of the following: 
Denial of service attack, 
missing patches, 
backdoor attack, 
unpublished vulnerability in the code, 
weak client security, 
weak authentication, 
weak encryption key section, 
social engineering
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. The two different types of VPN commonly used for remote access VPN commonly used for remote access VPN are ___ and ___.
A

SSL, IPSec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. Pick TWO advantages of using an open-source VPN solution instead of a commercial solution.
  2. Low cost
  3. Good Vendor support
  4. Minimize installation and configuration time
  5. Use existing hardware
  6. Easier to troubleshoot
A

Low cost

Use existing hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. The ability for a network or system user to remain unknown to adversaries is ___.
A

anonymity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  1. Which of the following are benefits of using a commercial VPN instead of an open-source VPN solution? (More than one answer MAY be correct)
  2. More costly
  3. Less flexible
  4. Product support
  5. Requires higher skill set to deploy and support
  6. Dedicated hardware
A

Product support

Dedicated hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. A document that details the requirements for using the VPN is called a ___.
A

VPN policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  1. Which of the following are vulnerabilities common to both software and hardware VPN solutions? (Multiple answers may be correct)
  2. Default password
  3. Unpublished vulnerability in the code
  4. Weak client security
  5. Weak authentication
  6. Blue Screen of Death
A

Unpublished vulnerability in the code
Weak client security
Weak authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  1. Which of the following are components of a VPN Policy? (Multiple answers may be correct)
  2. Introduction
  3. Scope
  4. VPN Configuration Settings
  5. Definitions
  6. Backup Strategy
A

Introduction

Scope

Definitions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  1. Keeping information about a network or system user from being disclosed to unauthorized people is known as ___.
A

privacy

17
Q
  1. Recognizing that vulnerabilities will be found with both hardware and software VPNs, be sure to ___ frequently.
A

.patch/update

18
Q
  1. Which of the following are not VPN best practices? (Multiple answers may be correct)
  2. Backup your configurations
  3. Pick the solution that gets the best reviews
  4. Don’t permit split tunneling
  5. Use vulnerability management
  6. Secure your endpoints
A

Pick the solution that gets the best reviews

19
Q
  1. The best authentication method for client VPNs is ___.
A

two-factor or token/biometric

20
Q
  1. When protecting the availability of your VPN, it is a good practice to have ___ VPN gateways in your environment.
A

redundant

21
Q
  1. Which of the following are protocols that can be used for high availability with VPNs? (Multiple answers may be correct)
  2. IPSec
  3. IDES
  4. HSRP
  5. VRRP
  6. SSL
A

HSRP

VRRP

22
Q
  1. If you want to verify that the VPN is on the network, what is the simplest tool you can use?
  2. Snort
  3. Ping
  4. Traceroute
  5. VPN Monitor
  6. Syslog
A

Ping

23
Q
  1. When troubleshooting a VPN issue, which of the following are valid troubleshooting steps? (Multiple answers may be correct)
  2. Don’t panic
  3. Gather the symptoms
  4. Run the vulnerability scan
  5. Review changes to the environment
  6. Upgrade the VPN software
A

Don’t panic

Gather the symptoms

Review changes to the environment

24
Q
  1. Your VPN policy should address which of the following topics? (Multiple answers may be correct)
  2. Define authentication methods permitted
  3. Define the VPN platform
  4. Define required encryption levels for VPN connections
  5. Define the troubleshooting process
  6. Define how to respond to incidents
A

Define authentication methods permitted

Define required encryption levels for VPN connections

25
Q
  1. In addition to redundant VPNs, also make sure to have redundant ___ for your VPN to be truly available.
A

circuits