Section 5 Flashcards

1
Q

firewalls

A

○ Maintain control over traffic that flows in and out of networks
○ Examine packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

stateful packet inspection

A

Can watch traffic over a given connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Deep packet inspection

A

Analyze actual content of traffic that flows through

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Proxy servers

A

○ Special firewalls
○ Pertain to applications
○ Provide security and performance features

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Kismet

A

detect wireless access points

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Scanners

A

○ Tools that enable you to interrogate devices and networks for information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Packet sniffer examples

A

tcpdump, wireshark

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are two main methods of an IDS?

A

signature based, anomaly based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which set of policies and procedures outlines the steps an organization will take during a state of emergency to replace IT infrastructure?

A

disaster recovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which network security tool deliberately configures a system with fabricated vulnerabilities to detect and monitor the activities of an attacker?

A

honeypot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which type of controls employ measures such as policies, procedures, and guidelines to protect people?

A

administrative controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly