IS3220 CHAPTER 11 Flashcards
The ability for a network or system user to remain unknown is called ___?
A number of tools and techniques provide this when connected to a network, although the underlying network protocols make true ___ very difficult.
ANONYMITY
Keeping information about a network or system user from being disclosed to unauthorized entities. While typically focused on private information like Social Security number, medical records, credit card number, cell phone number, etc., these concerns extend to any data that represents personally identifiable information (AKA PII). This is called ___?
PRIVACY
An industry term referring to any product that appears in a vendor’s PowerPoint slide deck, but is not yet available in one of its products is called ___?
SLIDEWARE
A method of proving identity using two different authentication factors. These factors are something you know, something you have, or something you are. EX: a smart card (you have) with a PIN (something you know), a biometric device (something you are) or a proximity card (something you have) that activates a fingerprint reader (something you are. This is called ___?
TWO-FACTOR AUTHENTICATION
The technology and business processes used to identify, track, and mitigate known weaknesses on hosts within a computing environment is called ___?
VULNERABILITY MANAGEMENT
- Which response contains the three most common VPN deployment architectures?
- Bypass, encrypted, Open VPN
- DMZ, Open VPN, internally connected
- DMZ, Encrypted, Open VPN
- Encrypted, Open VPN, internally connected
- Bypass, DMZ, internally connected
Bypass, DMZ, internally connected
- All the following are considered VPN management best practices except:
- If one is good, two is better
- Patch regularly
- Permit split tunnelling
- Do not allow employee-owned computers to connect
- Review usage
Permit split tunnelling
- Three of the threats common to both software and hardware VPNs include ___, ___, ___.
Three of the following: Denial of service attack, missing patches, backdoor attack, unpublished vulnerability in the code, weak client security, weak authentication, weak encryption key section, social engineering
- The two different types of VPN commonly used for remote access VPN commonly used for remote access VPN are ___ and ___.
SSL, IPSec
- Pick TWO advantages of using an open-source VPN solution instead of a commercial solution.
- Low cost
- Good Vendor support
- Minimize installation and configuration time
- Use existing hardware
- Easier to troubleshoot
Low cost
Use existing hardware
- The ability for a network or system user to remain unknown to adversaries is ___.
anonymity
- Which of the following are benefits of using a commercial VPN instead of an open-source VPN solution? (More than one answer MAY be correct)
- More costly
- Less flexible
- Product support
- Requires higher skill set to deploy and support
- Dedicated hardware
Product support
Dedicated hardware
- A document that details the requirements for using the VPN is called a ___.
VPN policy
- Which of the following are vulnerabilities common to both software and hardware VPN solutions? (Multiple answers may be correct)
- Default password
- Unpublished vulnerability in the code
- Weak client security
- Weak authentication
- Blue Screen of Death
Unpublished vulnerability in the code
Weak client security
Weak authentication
- Which of the following are components of a VPN Policy? (Multiple answers may be correct)
- Introduction
- Scope
- VPN Configuration Settings
- Definitions
- Backup Strategy
Introduction
Scope
Definitions