Technologies and Tools 3 Flashcards

1
Q

Other than a firewall, what other device uses ACL?

A

Router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Setting up a non-secure remote session to your LAN.

A

Policy violation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

IPSec mode between two servers on your LAN.

A

Transport mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Add an application, EXE, or a DLL so it will run.

A

Whitelist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Prevent DNS poisoning by using DNSSEC. What recordsare created?

A

RRSIG

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The system does not detect an attack.

A

False negative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What will you do if a mobile phone is lost or stolen?

A

Remote wipe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

On a firewall, the result when the traffic is not on the allow rules.

A

Implicit deny

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Lets you monitor the attack methods used.

A

Honeypot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Used to protect PII and sensitive information from leaving the company by email or USB.

A

DLP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A NIPS where all the traffic flows through it.

A

Inline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How to keep personal and business data separate on a cell phone.

A

Storage segmentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A tool that tells you the patch version of a web server.

A

Banner grabbing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A firewall that can also perform malware inspection.

A

UTM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

IPSec mode in a site-to-site VPN.

A

Tunnel mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A passive device that works with a NIPS.

A

NIDS

17
Q

A stolen Bluetooth phone used for texting your friends and family.

A

Bluejacking

18
Q

A tool that can be used for banner grabbing.

A

Netcat (nc)

19
Q

Can be used instead of a motion sensor to detect motion.

A

Camera

20
Q

Adding a third-party application to your phone.

A

Sideloading

21
Q

How to protect a mobile telephone.

A

FDE, screen locks

22
Q

The system detects a virus but manual inspection contradicts it.

A

False positive

23
Q

Secure remote access protocol that can use a GUI to access a router.

A

SSH

24
Q

How you could block unwanted applications.

A

Blacklist

25
Q

Used for secure transfer of data between two hosts.

A

TLS