Perimeter Security Flashcards

1
Q

Security devices focused on the boundary between the LAN and the WAN
in your organization’s network

A

Perimeter Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

_____ screen traffic between two portions of a network

A

Firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Inspects each packet passing through the firewall and accepts or rejects it
based on the rules

A

Packet Filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Filters traffic based upon the ports being utilized and type of connection
(TCP or UDP)

A

NAT Filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

gateway conducts an in-depth inspection based upon the
application being used

A

Application Layer Gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Operates at the session layer and only inspects the traffic during the
establishment of the initial session over TCP or UDP

A

Circuit Level Gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Traffic is allowed to enter or leave the network because there is an ACL
rule that specifically allows it

A

Explicit Allow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Traffic is denied the ability to enter or leave the network because there is
an ACL rule that specifically denies it

A

Explicit Deny

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Traffic is denied the ability to enter or leave the network because there is
no specific rule that allows it

A

Implicit Deny

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Firewall installed to protect your server by inspecting traffic being sent to
a web application

A

Web Application Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

§ A device that acts as a middle man between a device and a remote server

A

Proxy Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

is used to secure a network by keeping its machines
anonymous during web browsing

A

IP Proxy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Attempts to serve client requests by delivering content from itself
without actually contacting the remote server

A

Caching Proxy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Used in organizations to prevent users from accessing prohibited
websites and other content

A

Internet Content Filter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A go-between device that scans for viruses, filters unwanted
content, and performs data loss prevention functions

A

Web Security Gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A single computer (or file, group of files, or IP range) that might be
attractive to an attacker

A

Honeypot

17
Q

§ A group of computers, servers, or networks used to attract an attacker

A

Honeynet

18
Q

Systems designed to protect data by conducting content inspection of
data being sent out of the network
§ Also called Information Leak Protection (ILP) or Extrusion Prevention
Systems (EPS)

A

Data Loss Prevention

19
Q

§ Attempts to detect, log, and alert on malicious network activities

A

Network Intrusion Detection Systems(NIDS)

20
Q

§ Attempts to remove, detain, or redirect malicious traffic

A

Network Intrusion Prevention System (NIPS)

21
Q

Combination of network security devices and technologies to provide
more defense in depth within a single device

A

Unified Threat Management