Random Topics to memorize Flashcards

These were topic that I just couldn't get to stick. Hope they help!

1
Q

This allows you to modify an application to run as though it is in an older/newer type of OS such as Windows 7, or 8 while installed on Windows 10. A malware creator, could write their own version of this to pretend as if it was a previous version.

A

Shimming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

This can also be called “Metamorphic” malware. If you’re looking for a virus to be the same every time, for instance with an anti-virus signature, this now makes it much more difficult to identify because it will change the way it is written.

A

Refactoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Tester is given little to no information about the company that they are going to penetrate.

A

Black Box Testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Tester is given plenty of information about the company that they will penetrate. They are told about the infrastructure of the network and other important details.

A

White Box Testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

This form of testing includes giving the tester something like a guest account and seeing how someone could escalate their privileges.

A

Gray Box Testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Only needs rules for outbound traffic, it then develops a new rule table to keep track of active sessions. Any communication outside of the session will be blocked.

A

Stateful Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Need rules to allow outbound traffic and inbound traffic.

A

Stateless Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Allows you set up an encrypted tunnel. Any data sent through the tunnel is useless to anyone else.

A

VPN Concentrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The type of VPN you could use to access your network’s resources from a remote location.

A

Remote Access VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Type of VPN that two networks or sites use to send encrypted information to one another.

A

Site-To-Site VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Both the IP header and the data are encrypted. They’re wrapped around an IPSec header and an IPSec trailer, and then a completely different IP header is put on the front of the packet.

A

IPSec Tunnel Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The data is encrypted. You have an IPSec header and an IPSec trailer put on either side of the data, and then you use the original IP header to be able to get that data to the remote site.

A

IPSec Transport Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Adds encryption to AH header, the original IP header, and data. Then it adds a new header and a IPSec trailer.

A

Encapsulation Security Payload (ESP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The IPS watches for specific traffic based off of a particular signature. If the signature matches what is on the system it will be blocked.

A

Signature Based NIPS/NIDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Instead of using a specific set of characteristics it will use artificial intelligence to decide if the data coming through it is malicious or not.

A

Heuristic/Behavioral NIPS/NIDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Your IPS will sit in the network and learn/understand what is considered normal traffic flow. If something comes through the network that isn’t apart of the usual flow of data it will block it.

A

Anomaly Based NIPS/NIDS

17
Q

This is where your IPS sits in the middle of the conversation and if something malicious tries to come through it, it will be denied.

A

Inline NIPS/NIDS

18
Q

Is set up in the network in an out-of-band installation. Traffic will go through the network and a copy is sent to the IPS/IDS and if it malicious it will send you a message and block the traffic.

A

Passive NIPS/NIDS

19
Q

To protect against DDoS you can configure the maximum number of MAC addresses that can access the network through MAC filtering.

A

Flood Guard

20
Q

Makes requests on the user’s behalf and analyzes data that is sent back as a response and determines if it is safe for the user.

A

Forward Proxy

21
Q

Sits on the outside of the Internet, anyone who needs to gain access to an internal service such as a web server will first connect to a proxy.

A

Reverse Proxy