perimeter defense II Flashcards

1
Q

a firewall that makes decision by examining information in the IP packet head

A

packet filtering firewall

stateless

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

a firewall that makes decision about which traffic to allow based on virtual circuits

A

statefull inspection firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

a firewall that makes decision based on information contained within the data portion of a packet

A

application firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

this devices stands as a intermediary between a secure network and a private one and is a specific implementation of an application level firewall

A

proxy server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

a _____ firewall inspects traffic as it flows between networks

A

network based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

a ______ firewall inspects traffic received by a host.

A

host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

a packet filtering firewall operates at _____ layer OSI ___

A

network

3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

a stateful inspection firewall operates at _____ layer OSI ___

A

session

5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

a application layer firewall operates at _____ layer OSI ___

A

application

7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

a collection of components that allow administrator to regulate network access on a computer’s compliance with health requirement policies is called

A

Network access protection (NAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

a statement that reports the client configuration for health requirements.

A

statement of health

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

the server that is responsible for keeping track of health requirements and verifying that clients meet its requirements before gaining access.

A

NAP server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

the ____ server is the connection point for clients to submitting the SoH for validation.

A

enforcement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

_______ servers are a set of resources that a non-compliant computer can have limited access

A

remediation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

a ______ server control access by leasing address only to computers that meet the health requirement

A

DHCP enforcement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

a ______ server can be combined with NAP to allow or deny access based on health compliance

A

remote desktop gateway

17
Q

software used to monitor and restrict contents delivered across the web to an end user

A

internet content filter

18
Q

the ability to analyze an manage network traffic based on the application layer protocol

A

application aware devices

19
Q

a portions of the network that have specific security concerns or requirements

A

security zones

20
Q

a session based attack that intercept information passing between two communication partners

A

man in the middle

21
Q

a session based attack that extension of a man in the middle attack where the attackers steals an open and active communication session from a legitimate use

A

TCP/IP hijacking

22
Q

a session based attack that hijacks a user’s cookies and uses them to take over the session

A

HTTP hijacking

23
Q

a session based attack that uses a protocol analyzer to capture authentication information going from the client to the server

A

replay attack

24
Q

a session based attack that makes a connection using black username and passwords

A

null session

25
Q

a technique that hides the true source of packets

A

spoofing

26
Q

this is the first VPN protocol

A

Point to point tunneling

PPTP

27
Q

this VPN technology was developed by cisco

A

layer 2 forwarding (L2F)

28
Q

the VPN technology is an open standard for secure multi-protocol routing

A

layer 2 tunneling (L2TP)

29
Q

_____ runs on the NAP server and identifies the client health requirements.

A

statement of health validator

30
Q

the enforcement server forwards the SoH to the ______ server for validation

A

NAP

31
Q

what the purpose for remediation servers

A

to make non-complaint clients compliant

32
Q

a _______ router translates multiple private addresses into the single registered IP address

A

network address translation

33
Q

NAT routers use ______ to associate a port number with a request for a private host

A

port address translation