Securing a Network Flashcards

1
Q

What is the device/application that controls the flow of traffic by preventing unauthorized network traffic from entering or leaving a particular segment of a network called?

A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What type of firewall compares received traffic with a set of rules that define which traffic it will permit to pass through the firewall, and has no memory of packets it has encountered in the past?

A

Packet filtering firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What type of firewall remembers information about the status of a network communication, once the firewall receives the first packet in a communication, the firewall remembers that communication session until it is closed, only needs to check rules when a new communication session starts?

A

Stateful inspection firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What type of firewall inspects the contents of packets, specifically designed to monitor and control traffic based on the applications or services generating data, can enforce more granular policies by inspecting application-specific commands or data payloads?

A

Application layer firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What type of firewall does not allow packets to travel directly between systems on opposite sides of the firewall. It opens separate connections with each of the communicating systems and then acts as a broker (or proxy) between the two, which allows for an added degree of protection b/c the firewall can analyze info about the application in use when making the decision to allow or deny traffic?

A

Proxy firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What security measure passively listens and monitors the network, alerting the admin of any detected suspicious behavior, available as virtual and host-based application that can be configured to operate in tap mode, identifying malicious traffic when detected?

A

Intrusion Detection System (IDS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What security measure has cables physically routed through devices to create choke points blocking threats when they are intercepted, available as virtual and host-based application that can be configured to operate in tap mode, identifying and blocking malicious traffic when detected?

A

Intrusion Prevention System (IPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What scrambles data and has two ways to do it?

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the two encryption types?

A

Symmetric and Asymmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which type of encryption is the strongest, widely used, fast, and the key that encrypts also decrypts?

A

Symmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which type of encryption is slower, can’t encrypt large amounts of data, has a public and private key, and when you use one key to encrypt you can only decrypt with the other key?

A

Asymmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is encrypted plaintext called?

A

Ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the process by which we secure and lock down our software, systems, individual applications, or the entire organization?

A

Hardening

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What security measure uses several defensive security controls to protect the data, applications, and network and designed to slow down the attack?

A

Defense in depth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a short written statement that the people in charge of an organization have set as a course of action or direction, comes from upper management, and applies to the entire organization?

A

Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a detailed written definition for hardware and software and how they are to be used, ensure that consistent security controls are used throughout the IT system?

A

Standard

17
Q

What are written instructions for how to use policies and standards, may include a plan of action for installation, testing, and auditing of the security controls?

A

Procedures

18
Q

What is a suggested course of action for using the polices, standards, or procedures, and can be specific or flexible regarding use?

A

Guidelines