Network+ Chapter 15 Flashcards

1
Q

Firewalls are usually a combination of ________ and ________?

p. 529

A

hardware and software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

T or F Firewalls can be placed on top of an existing operating system or be self-contained.

A

Ture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define network-based firewall?

p. 530

A

It’s what companies use to protect their private network from public networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

This is a firewall that is on a single PC and will protect that single PC only?

p. 530

A

host-based firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

T or F Host based Firewalls are normally software based?

p. 530

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the first line of Defense for any network that’s connected to the internet?

p. 531

A

access control lists (ACLs).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Packet Filtering?

pg 537

A

Packet Filtering refers to the ability of a router or a firewall to discard packets that don’t meet the right criteria.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which type of filtering do firewalls use?

Pg 537

A

dynamic packet filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Why would you implement a IP Proxy?

p 537

A

to hide all of your internal IP addresses from hackers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The first firewalls were developed and worked at which layer of the OSI Model and were also known as_________?
p. 540

A
Network layer (Layer 3)
packet-filter firewalls.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define the term zone?

pg 545

A

Its an individual area of the network that has been configured with a specific trust level.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

T or F An intrusion detection system cannot detect attacks within encrypted traffic.
p. 548

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

T or F An intrusion detection system is the best way to replace a firewall on your network?
p. 548

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are two ways two ways IDSs can detect attacks or intrusions.
p. 548

A

misuse-detection IDS

anomaly-detection IDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a smart system?

p. 548

A

it learns on the go by keeping track of and building a history of network activity for norms to which you can compare unusual activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are 3 examples of passive responses?

A

logging,notification,shunning

17
Q

What are 3 examples of Active responses

p. 549

A

Change network config
Terminating Sessions
deceive the attacker

18
Q

___________is a propriety vulnerability scanning program that requires a license to use commercially yet is the single most popular scanning program in use.
p. 551

A

Nessus

19
Q

what are 3 things that Network Mapper also known as NMAP can do?

pp. 551-552

A

Perform port scanning
Identify versions of network services in operation on the network
Identify operating systems

20
Q

What is a VPN concentrator?

p. 552

A

Its a device that creates remote access for virtual private networks VPNs either for users logging in remotely or for a large site-to-site VPN.

21
Q

___________is a physical security access control system comprising a small space with two sets of interlocking doors, such that the first set of doors must close before the second set opens

A

mantrap

22
Q

What are the 3 categories that disasters are classified as?

p. 560

A
Technological disasters (device failures) 
Manmade disasters (arson, terrorism, sabotage) 
Natural disasters (hurricanes, floods, earthquakes)
23
Q

__________is designed to simulate an attack on a system, network, or application.
p. 565

A

penetration test

24
Q

What are three examples of penetration testing?

A

Blind Test
Double Blind
Target test

25
Q

____________software runs on one computer to detect abnormalities on that system alone by monitoring applications, system logs, and event logs— not by directly monitoring network traffic.

p. 551

A

host-based IDS or HIDS