Network+ Extra 6 Flashcards

1
Q

Uses a packet’s original IP header, as opposed to adding an additional tunnel header. This approach works well in networks where increasing a packet’s size might cause an issue. Also, _________ ____ is often used for client-to-site VPNs, where a PC running VPN client software connects back to a VPN termination device at a headquarters location.

A

Transport Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Unlike transport mode, ______ mode encapsulates an entire packet. As a result, the encapsulated packet has a new header (an IPSec header). This new header has source and destination IP address information that reflects the two VPN termination devices at different sites. Therefore, ______ mode is often used in an IPSec site-to-site VPN.

A

Tunnel Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

is a VPN protocol that lacks security features, such as encryption. However, ____ can still be used for a secure VPN connection if it is combined with another protocol that does provide encryption.

A

Layer 2 Tunneling Protocol (L2TP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

is a VPN protocol designed (by Cisco Systems) with the intent of providing a tunneling protocol for PPP. Like L2TP, ___ lacks native security features.

A

Layer 2 Forwarding (L2F)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

is an older VPN protocol (which supported the dial-up networking feature in older versions of Microsoft Windows). Like L2TP and L2F, ____ lacks native security features. However, Microsoft’s versions of ____ bundled with various versions of Microsoft Windows were enhanced to offer security features.

A

Point-to-Point Tunneling Protocol (PPTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

whereas an IDS device receives a copy of traffic to be analyzed, an IPS device resides inline with the traffic

A

IDS/IPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A signature could be a string of bytes, in a certain context, that triggers detection.

A

signature-based detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

based on network policies and if something happens out of policy it is reported.

A

policy-based detection :

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Anomaly-based detection : detecting things outside of normal conditions

________ anomaly detection : This approach watches network-traffic patterns over a period of time and dynamically builds a baseline. Then, if traffic patterns significantly vary from the baseline, an alarm can be triggered.

A

anomaly-based detection (Statistical Anomaly based detection)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

___________ anomaly detection : This approach allows an administrator to define what traffic patterns are supposed to look like, so anything outside the baseline will be reported and or blocked.

A

Nonstatistical anomaly detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly