Section 15: Security Technologies Flashcards

1
Q

What is a Firewall?

A

Uses a set of rules defining the traffic types permitted or denied through device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a NextGen Firewall (NGFW)?

A

Third-generation firewall that conducts deep packet inspection and packet filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is an Access Control List (ACL)?

A

Set of rules applied to router interfaces that permit or deny certain traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a Demilitarized Zone (DMZ)?

A

Connects to devices that should have restricted access from the outside zone (like web servers)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Telnet and what is the Port Number?

A

Sends text-based commands to remote devices and is a very old networking protocol. Port 23

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Secure Shell (SSH) and what is the Port Number?

A

Encrypts everything that is being sent and received between the client and the server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Remote Desktop Protocol (RDP) and what is the Port Number?

A

Provides graphical interface to connect to another computer over a network connection. Port 3389

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a Remote Desktop Gateway (RDG)?

A

Provides a secure connection using the SSL/TLS protocols to the server via RDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a Virtual Private Network (VPN)?

A

Establishes a secure connection between a client and a server over an untrusted public network like the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Virtual Network Computing (VNC) and what is the Port Number?

A

Designed for thin client architectures and things like Virtual Desktop Infrastructure (VDI). Port 5900

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is In-Band Management?

A

Managing devices using Telnet or SSH protocols over the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Out-of-Bound Management?

A

Connecting to and configuring different network devices using an alternate path or management network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is an Extensible Authentication Protocol (EAP)?

A

Allows for more secure authentication methods to be used instead of just a username and a password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a Site-to-Site VPN?

A

Interconnect to sites and provide an inexpensive alternative to dedicated lease lines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a Client-to-Site VPN?

A

Connecting a single remote user back to a corporate network.

Client to Router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a Clientless VPN?

A

Creates a secure, remote-access VPN tunnel using a web browser without requiring a software or hardware client

17
Q

What is a Split Tunnel VPN?

A

Routes and encrypts only the traffic bound for the headquarters over the VPN, and sends the rest of the traffic to the regular Internet

Better Performance

18
Q

What is a Full Tunnel VPN?

A

Routes and encrypts all network requests through the VPN connection back to the headquarters

More security

19
Q

What is a Secure Socket Layer (SSL)?

A

Provides cryptography and reliability using the upper layers of the OSI model, specifically Layers 5, 6, and 7

20
Q

What is the Transport Layer Security (TLS)?

A

Provides secure web browsing over HTTPS

21
Q

What is Internet Security (IPSec)?

A

Provides authentication and encryption of data packets to create a secure encrypted communication path between two computers

22
Q

What does CIA stand for?

A

Confidentiality, Integrity, Authentication

23
Q

What is Confidentiality?

A

Using data encryption

24
Q

What is Integrity?

A

Ensuring data is not modified in transit

25
Q

What is Authentication?

A

Verifying parties are who they claim to be

26
Q

What is an Authentication Header (AH)?

A

Provides connectionless data integrity and data origin authentication for IP datagrams and provides protection against replay attacks

27
Q

What is an Encapsulating Security Payload (ESP)?

A

Provides authentication, integrity, replay protection, and data confidentiality

28
Q

What is the Simple Network Management Protocol (SNMP) and what is the Port Number?

A

Used to send and receive data from managed devices back to a centralized network management station. Port Number is 161 & 162

29
Q

What is a Management Information Base (MIB)?

A

The structure of the management data of a device subsystem using a hierarchical namespace containing object identifiers

30
Q

What is the System Logging Protocol (Syslog) and what is the Port Number?

A

Sends system log or event messages to a central server. Port Number 514

31
Q

What is a Traffic Log?

A

Contains information about the traffic flows on the network

32
Q

What is an Audit Log?

A

Contains information about software running on a client or server

33
Q

What is the Security Information and Event Management (SIEM)?

A

Provides real-time or near-real-time analysis of security alerts generated by network hardware and applications