Security Technologies Flashcards

1
Q

Firewall

A

Uses a set of rules to prevent or allow access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Packet-Filtering Firewall

A

Permits or denies traffic based on packet header

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Stateful Firewall

A

Inspects traffic as part of a session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

NGFW

A

third gen firewall that conducts deep packet inspection and packet filtering (operates a 5, 6 and 7 of the OSI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Firewall Zone

A

Firewall interface in which you set up rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Unified Threat Management Device (UTM)

A

Combines firewall, router, intrusion detection/prevention system, anti-malware, and other features into a single device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Telnet

A

plain text remote access; port 23

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

RDG (Remote Desktop Gateway)

A

provides a secure connection using the SSL/TLS protocols for rdp

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Virtual Network Computing (VNC)

A

Designed for thin client architecture; Port 5900

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

VDI

A

Hosts a desktop in a virtual environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

In-Band Management

A

Managing devices with telnet or ssh inside the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

out of band

A

managing outside the network; separate network; serial cable or console port is out of band

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

CHAP (Challenge Handshake Authentication Protocol)

A

Sends the client a string of random text called a challenge which is then encrypted using a password and sent back to the server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

site to site vpn

A

connect two offices together

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Full tunnel vpn

A

routes and encrypts all network requests through the VPN connection back to the headquarters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

split tunnel vpn

A

routes and encrypts only the traffic bound for the headquarters over the VPN, and sends the rest of the traffic to the regular internet

17
Q

Clientless VPN

A

creates a secure connection through a web browser

18
Q

Layer 2 Forwarding (L2F)

A

Provides a tunneling protocol for the P2P protocol but also lacks native security and encryption features

19
Q

IPSec

A

Provides auth and encryption for VPN

20
Q

What are the 5 IPSec steps?

A

Key exchange request, IKE Phase 1, IKE Phase 2, Data transfer, Tunnel termination

21
Q

Managed Device

A

Any device that can communicate with an SNMP manager known as the management information base (MIB)

22
Q

Granular Trap

A

Sent trap messages get a unique objective identifier to distinguish each message as a unique message being received

23
Q

Management Information Base (MIB)

A

The structure of the management data of a device subsystem using hierarchical namespace containing object identifiers; don’t send redundant info just changes

24
Q

Verbose

A

SNMP traps may be configured to contain all the information

25
SNMPv3
Provides three security enhancements which added integrity, authentication and confidentiality to the SNMP protocol
26
System Logging Protocol (Syslog)
Sends system log or even messages to a central server, called a syslog server
27
Syslog level 0
emergency
28
1
Alert
29
2
Critical
30
3
Error
31
Warning
4
32
5
Notice
33
Information
6
34
Debugging
7