network defense Flashcards

1
Q

on a network device, default accounts and passwords should be

A

changed immediately

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

it allows a user to take advantage of a software bug to gain access to system resources that would typically not be available to the user

A

privilege escalation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

an unprotected access method or pathway.

A

backdoor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

a network device that detect attacks and suspicious activity.

A

intrusion detection system (IDS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

this variation of IDS monitors, logs, and detects security breaches but takes no action to stop or prevent the attack

A

passive IDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

this variation of IDS performs the functions of an IDS but can also react when security breaches occur.

A

active IDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

this IDS feature looks for patterns in network traffic and compares it to known attack patterns called

A

signature recognition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

this IDS feature monitors traffic to define a standard activity pattern as “normal.”

A

anomaly recognition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

a IDS is installed on a single host and monitors all traffic it coming in is called

A

host-based IDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

a IDS dedicated device installed on the network

A

network-based IDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

a device or virtual machine that entices intruders by displaying a vulnerable trait or flaw or by appearing to contain valuable data

A

honeypot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

a network of honeypots.

A

honeynet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

a honeypot that answers connection requests in such a way that the attacking computer is “stuck” for a period of time

A

tarpit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

the objectives of using honeypots and tarpits are to

A

distract an attacker
and
observe the attackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what is a SAN

A

storage area network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SANs use the ______ protocol for communication between servers and hard disk drives.

17
Q

The SCSI protocol uses _____ to identify logical devices on the SCSI bus

A

logical unit numbers (LUNs)

18
Q

SAN information can be protected by

19
Q

______ zoning fabric naming service is configured such that a SAN host can only “see” the names of storage devices in the same zone.

20
Q

____ zoning configures ACLs to restrict communications between SAN hosts and storage devices

21
Q

______ zoning are defined by assigning SAN switch ports to specific zones

22
Q

_____ can be used to divide a SAN into multiple logical SANs in much the same manner as VLANs do on a standard network

A

virtual SANs

23
Q

_____ can be used to bind specific SAN IDs to specific SAN switch ports.

A

port locking

24
Q

________ changes the source MAC address on frames sent by the attacker.

A

MAC spoofing

25
_______ associates the attacker's MAC address with the IP address of victim devices.
ARP spoofing/poisoning
26
______ overloads the switch's MAC forwarding table to make the switch function like a hub.
MAC flooding
27
this SAN authentication solution uses passwords for authentication using the Secure Remote Password (SRP) protocol.
Fibre Channel Password Authentication Protocol (FCPAP)
28
this SAN authentication solution uses digital certificates to mutually authenticate SAN hosts.
Fibre Channel Authentication Protocol (FCAP) uses
29
Fibre Channel SAN uses ____ authentication protocol
difie-hellman challenge handshake authentication | DH-CHAP
30
this SAN authentication solution uses a pre-shared key to mutually authenticate SAN hosts.
Fibre Channel SAN