network defense Flashcards

1
Q

on a network device, default accounts and passwords should be

A

changed immediately

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

it allows a user to take advantage of a software bug to gain access to system resources that would typically not be available to the user

A

privilege escalation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

an unprotected access method or pathway.

A

backdoor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

a network device that detect attacks and suspicious activity.

A

intrusion detection system (IDS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

this variation of IDS monitors, logs, and detects security breaches but takes no action to stop or prevent the attack

A

passive IDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

this variation of IDS performs the functions of an IDS but can also react when security breaches occur.

A

active IDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

this IDS feature looks for patterns in network traffic and compares it to known attack patterns called

A

signature recognition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

this IDS feature monitors traffic to define a standard activity pattern as “normal.”

A

anomaly recognition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

a IDS is installed on a single host and monitors all traffic it coming in is called

A

host-based IDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

a IDS dedicated device installed on the network

A

network-based IDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

a device or virtual machine that entices intruders by displaying a vulnerable trait or flaw or by appearing to contain valuable data

A

honeypot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

a network of honeypots.

A

honeynet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

a honeypot that answers connection requests in such a way that the attacking computer is “stuck” for a period of time

A

tarpit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

the objectives of using honeypots and tarpits are to

A

distract an attacker
and
observe the attackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what is a SAN

A

storage area network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SANs use the ______ protocol for communication between servers and hard disk drives.

A

SCSI

17
Q

The SCSI protocol uses _____ to identify logical devices on the SCSI bus

A

logical unit numbers (LUNs)

18
Q

SAN information can be protected by

A

zoning

19
Q

______ zoning fabric naming service is configured such that a SAN host can only “see” the names of storage devices in the same zone.

A

soft

20
Q

____ zoning configures ACLs to restrict communications between SAN hosts and storage devices

A

hard

21
Q

______ zoning are defined by assigning SAN switch ports to specific zones

A

port

22
Q

_____ can be used to divide a SAN into multiple logical SANs in much the same manner as VLANs do on a standard network

A

virtual SANs

23
Q

_____ can be used to bind specific SAN IDs to specific SAN switch ports.

A

port locking

24
Q

________ changes the source MAC address on frames sent by the attacker.

A

MAC spoofing

25
Q

_______ associates the attacker’s MAC address with the IP address of victim devices.

A

ARP spoofing/poisoning

26
Q

______ overloads the switch’s MAC forwarding table to make the switch function like a hub.

A

MAC flooding

27
Q

this SAN authentication solution uses passwords for authentication using the Secure Remote Password (SRP) protocol.

A

Fibre Channel Password Authentication Protocol (FCPAP)

28
Q

this SAN authentication solution uses digital certificates to mutually authenticate SAN hosts.

A

Fibre Channel Authentication Protocol (FCAP) uses

29
Q

Fibre Channel SAN uses ____ authentication protocol

A

difie-hellman challenge handshake authentication

DH-CHAP

30
Q

this SAN authentication solution uses a pre-shared key to mutually authenticate SAN hosts.

A

Fibre Channel SAN