Security Flashcards

1
Q

SSL

A

Secure sockets layer
-cryptographic protocol designed to secure network communications at the upper layers (5,6, and 7)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Stateful Firewall

A

Inspects traffic as part of a session and recognizes where the traffic originated
-allows traffic that originates from inside the network and go out to the internet
-blocks traffic originated from internet from getting into network
-tracks and is more secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

NextGen Firewall (NGFW)

A

3rd generation firewall that conducts deep packet inspection and packet filtering
-can operate at layers 2-7 instead of just 2-4
-goes deeper than traditional stateful firewall and can inspect in the application level
-

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Stateless Firewall

A

Checks packets individually before deciding whether or not to permit them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

CPP - Control Plane Policing

A

-QoS filter that manages traffic flow of control plane packets to protect the control plane of Cisco routers and switches against DoS attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Port Security

A

-persistent MAC learning (or sticky MAC)
-enables switch interface to retain dynamically learned MAC when switch is restarted or interface goes down.
-prevents from someone unplugging a port and plugging in their laptop.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

DoS - TCP SYN Flood

A

Attacker initiates multiple TCP sessions, but never completes them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

DoS - ICMP Flood

A

Attacker sends ping to a subnet broadcast address with source IP spoofed to that of the victim server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

DNS poisoning

A

Attacker manipulates known vulnerabilities within the DNS to reroute traffic from one site to a fake version of that site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

UTM device

A

United Threat Management device
-combines firewall, router, intrusion detection/prevention system, anti malware, and other features into single device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

IDS / IPS

A

-Signature based detection (string of bytes)
-policy based detection (security policy)
-statistical anomaly based detection (watched baseline)
-non statistical anomaly based detection (admin defines patterns)
—Network based (NIDS/NIPS) (entire network)
—host based (HIPS/HIDS) (software based and installed on servers and clients)
-network and host based can work together for more protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

VNC

A

Virtual Network Computing
-port 5900
-cross platform screen sharing system created to remotely control another computer
-works on client/server model (VNC viewer on the client)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

In-Band Management

A

Managing devices with Telnet or SSH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Out-of-band Management

A

Connecting to devices with an alternative path to manage like plugging directly to or using a server connected directly to devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

L2TP

A

Layer 2 Tunneling Protocol
-lacks security features like encryption by default and needs to be combined with an extra encryption layer for protection
-extension of the point to point tunneling protocol (PPTP) used by ISPs to enable VPNs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly