Network Risk Management Flashcards

1
Q

the list of statements on a router to permit/deny traffic

A

ACL (access control list)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

a myriad of small, simple requests that all result in giant responses

A

amplification attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

the filter takes applications into consideration

A

application aware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

gives the firewall application awareness

A

Application Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

software security flaws

A

backdoor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

a group of computers in coordinated DDoS attacks without knowledge

A

botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

a document to make employees aware that their computer and equipment use will be monitored

A

consent to monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A system becomes inundated with service requests and ceases to respond

A

Denial of Service attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

software on a device that allows it to access the network, subsequently uninstalls

A

dissolvable agent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

multiple hosts inundate a target with traffic

A

Distributed attakc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

a DoS attack bounced off of uninfected computers (reflectors) before arriving at the target.

A

Distributed reflector attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A switch security feature to monitor ARP messages and detect phony ones

A

Dynamic ARP inspection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Implementation of TEMPEST to protect against RF emanation

A

emission security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

causing the target’s computer screen to fill with garbage

A

flashing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

An FTP client specifies a different host’s IP address and port number for data destination.

A

FTP bounce

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

scanning for malware-like behavior

A

heuristic scanning

17
Q

runs on a single computer, alerts about intrusions

A

HIDS (host-based intrusion detection system)

18
Q

runs on a single computer, intercepts intrusions

A

HIPS (host-based intrusion prevention system)

19
Q

dedicated service to monitor traffic and alert

A

IDS (intrusion detection system)

20
Q

dedicated service to prevent malicious traffic

A

IPS (intrusion prevention system)

21
Q

a virus in a macro that executes when a program is in use

A

macro virus

22
Q

a person captures or redirects secure data while in transit

A

man-in-the-middle attack

23
Q

combines known scanning techniques and exploits to explore potential exploits

A

metasploit

24
Q

employs network policies to determine a device’s access permissions.

A

NAC (network access control)

25
Q

some parts of the network have been physically separated in order to protect resources

A

network segementation

26
Q

A DoS attack rendering a device irreparable

A

permanent DoS attack

27
Q

a port on a switch that sends a copy of all traffic to a second port

A

port mirroring

28
Q

the assessment of an organization’s security vulnerabilities

A

posture assessment

29
Q

a section of the network that a device joins when its configurations do not meet compliance requirements

A

quarantine network

30
Q

a host that provides services to internet clients from servers on its own network

A

reverse proxy

31
Q

network hosts are flooded with broadcast messages

A

smurf attack

32
Q

a firewall that inspects packets to determine if they originate from an active connection

A

stateful firewall

33
Q

a firewall that inspects packets on a stand-alone basis

A

stateless firewall

34
Q

An NSA standard to protect against RF emanations

A

TEMPEST

35
Q

a software vulnerability for a program that has not yet become public.

A

zero-day attack