MIDTERM EXAM 21-50 Flashcards

1
Q

What is the primary function of a firewall

A

To control incoming and outgoing network traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

type of firewall examines the entire packet, including the payload

A

Next-generation firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a VPN (Virtual Private Network)

A

A software-defined network that creates a secure connection over an insecure
network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which VPN protocol is widely used for its strong security and performance

A

OpenVPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a DMZ (Demilitarized Zone

A

A logical network segment that separates internal networks from external networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the main advantage of using a VPN?

A

Enhanced network performance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which firewall type can inspect the contents of packets?

A
  • Stateful inspection firewall
  • Application-level gateway firewall

BOTH B AND C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

a common security concern with VPNs

A

Vulnerability to man-in-the-middle attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the key difference between firewalls and intrusion detection systems (IDS)?

A

Firewalls prevent attacks, while IDS detects attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

This is NOT a common VPN use case

A

Increasing network bandwidth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The primary function of an Intrusion Detection System (IDS)

A

To detect and alert on potential security threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

This type of IDS analyzes network traffic patterns to identify anomalies

A

Anomaly-based IDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the primary difference between an IDS and an Intrusion Prevention System (IPS)?

A

IDSs detect threats, while IPSs both detect and prevent threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

common challenge associated with IDPS implementation

A
  • High cost
  • False positives
  • Complex configuration

ALL OF THE ABOVE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What do attackers use as a common technique to bypass traditional security measures?

A
  • Phishing
  • SQL injection
  • Zero-day attacks

ALL OF THE ABOVE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

This security tool analyzes network traffic and identifies potential threats

A

Intrusion Detection System (IDS)

17
Q

the primary purpose of a firewall?

A

To prevent unauthorized access to a network

18
Q

This security tool monitors user activity and identifies potential insider threats

A

Security Information and Event Management (SIEM)

19
Q

a common vulnerability scanning tool

A

Nessus

20
Q

Which security principle involves minimizing the number of systems with Administrative privileges?

A

Least privilege

21
Q

What is the process of converting plaintext into ciphertext called

A

Encryption

22
Q

This cryptographic technique uses a single key for encryption and decryption?

A

Private-key cryptography

23
Q

This is a widely used symmetric-key encryption algorithm

A

AES

24
Q

the primary weakness of symmetric-key cryptography

A

Key distribution

25
Q

In public-key cryptography, which key is used to encrypt messages

A

Public key

26
Q

This is a common use case for public-key cryptography

A

Digital signatures

27
Q

What is the primary purpose of a hash function

A

To create a fixed-size digest of data

28
Q

Which property of hash functions ensures that it’s computationally infeasible to find two different inputs that produce the same hash output

A

Collision resistance

29
Q

A brute-force attack involves

A

Guessing the key systematically

30
Q

What is a man-in-the-middle attack

A

An attack where the attacker intercepts communication between two parties