Network Security Flashcards

1
Q

Penetration Testing

A

Tests network security by attempting to exploit vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

IP Tunnel

A

Secure VPN connection between two endpoints

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

SPI

A

Stateful Packet Inspection

Checks incoming packets against outgoing requests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Password Guidelines

A
No dictionary words
Not username - forwards or backwards
Limit login attempts
>= 8 characters
Alphanumeric
Change often
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

TLS

A

Transport Layer Security
Requires client and server to use certificates to verify identity
Replacement to SSL
Application Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

TTLS

A

Tunneled Transport Layer Security
Only authentication server is issued a certificate
Client authentication requires a password
Application Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

IPsec

A

IP Security
Each packet encrypted prior to transmission
Network Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Signature

A

AKA Definition

What antivirus software uses to identify viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

NAQC

A

Network Access Quarantine Control
Resource Kit tool in Windows Server 2003 / 2008
Admins prevent clients from connecting to network with machines that aren’t secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

ACL

A

Access Control List

List of permit and deny statements to control traffic in/out of network interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Technologies firewalls are based on

A

Packet filtering
Proxy server
Stateful packet filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

DMZ

A

Demilitarized zone

Isolated area for servers that communicate with the outside world

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Packet Filtering

A

Limits packets that can enter the network and what segment they can move to.
DA: fragmented packets can still enter, difficult to implement complex ACLs, not all network services can be filtered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Proxy Server

A

Client uses proxy server to access the server. Uses authentication and policies.
DA: run very slowly, adding services is difficult, proxy server failure = network failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Stateful Firewall

A

Inbound and outbound data packets are compared to determine if connection should be allowed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

IDS

A

Intrusion Detection System

Monitor inbound and outbound traffic and reports suspicious activity

17
Q

IPS

A

Intrusion Prevention System

Stops / prevents malicious attacks that it detects in real time

18
Q

HIDS

A

Host-based Intrusion Detection System

Monitors computer for changes to system file, registry, files, and system logs

19
Q

Web Filter

A

AKA Content Filter

Uses database of inappropriate websites. Monitors traffic on HTTP and HTTPS

20
Q

Packet Shaper

A

Prioritizes traffic based on type

21
Q

NGFW

A

Next-generation Firewall
AKA layer 7 firewall
Combines traditional firewall with other network appliances

22
Q

CIA

A

Confidentiality
Integrity
Availability
Example: Kerberos

23
Q

AAA

A

Authentication
Authorization
Accounting
Example: RADIUS or TACAS+

24
Q

RADIUS

A

Remote Authentication Dial-In Service

25
Q

TACAS+

A

Terminal Access Controller Access-Control System Plus

26
Q

NAC

A

Network Access Control

27
Q

UTM

A

Unified Threat Management
Wide range of security features in one appliance.
Could include: firewall, IDS/IPS, VPN, gateway antivirus/anti-spam, load balancing, content filtering