Technologies and Tools 3 Flashcards
Other than a firewall, what other device uses ACL?
Router
Setting up a non-secure remote session to your LAN.
Policy violation
IPSec mode between two servers on your LAN.
Transport mode
Add an application, EXE, or a DLL so it will run.
Whitelist
Prevent DNS poisoning by using DNSSEC. What recordsare created?
RRSIG
The system does not detect an attack.
False negative
What will you do if a mobile phone is lost or stolen?
Remote wipe
On a firewall, the result when the traffic is not on the allow rules.
Implicit deny
Lets you monitor the attack methods used.
Honeypot
Used to protect PII and sensitive information from leaving the company by email or USB.
DLP
A NIPS where all the traffic flows through it.
Inline
How to keep personal and business data separate on a cell phone.
Storage segmentation
A tool that tells you the patch version of a web server.
Banner grabbing
A firewall that can also perform malware inspection.
UTM
IPSec mode in a site-to-site VPN.
Tunnel mode
A passive device that works with a NIPS.
NIDS
A stolen Bluetooth phone used for texting your friends and family.
Bluejacking
A tool that can be used for banner grabbing.
Netcat (nc)
Can be used instead of a motion sensor to detect motion.
Camera
Adding a third-party application to your phone.
Sideloading
How to protect a mobile telephone.
FDE, screen locks
The system detects a virus but manual inspection contradicts it.
False positive
Secure remote access protocol that can use a GUI to access a router.
SSH
How you could block unwanted applications.
Blacklist
Used for secure transfer of data between two hosts.
TLS