Security Technologies Flashcards

1
Q

Firewall

A

Uses a set of rules to prevent or allow access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Packet-Filtering Firewall

A

Permits or denies traffic based on packet header

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Stateful Firewall

A

Inspects traffic as part of a session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

NGFW

A

third gen firewall that conducts deep packet inspection and packet filtering (operates a 5, 6 and 7 of the OSI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Firewall Zone

A

Firewall interface in which you set up rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Unified Threat Management Device (UTM)

A

Combines firewall, router, intrusion detection/prevention system, anti-malware, and other features into a single device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Telnet

A

plain text remote access; port 23

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

RDG (Remote Desktop Gateway)

A

provides a secure connection using the SSL/TLS protocols for rdp

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Virtual Network Computing (VNC)

A

Designed for thin client architecture; Port 5900

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

VDI

A

Hosts a desktop in a virtual environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

In-Band Management

A

Managing devices with telnet or ssh inside the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

out of band

A

managing outside the network; separate network; serial cable or console port is out of band

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

CHAP (Challenge Handshake Authentication Protocol)

A

Sends the client a string of random text called a challenge which is then encrypted using a password and sent back to the server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

site to site vpn

A

connect two offices together

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Full tunnel vpn

A

routes and encrypts all network requests through the VPN connection back to the headquarters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

split tunnel vpn

A

routes and encrypts only the traffic bound for the headquarters over the VPN, and sends the rest of the traffic to the regular internet

17
Q

Clientless VPN

A

creates a secure connection through a web browser

18
Q

Layer 2 Forwarding (L2F)

A

Provides a tunneling protocol for the P2P protocol but also lacks native security and encryption features

19
Q

IPSec

A

Provides auth and encryption for VPN

20
Q

What are the 5 IPSec steps?

A

Key exchange request, IKE Phase 1, IKE Phase 2, Data transfer, Tunnel termination

21
Q

Managed Device

A

Any device that can communicate with an SNMP manager known as the management information base (MIB)

22
Q

Granular Trap

A

Sent trap messages get a unique objective identifier to distinguish each message as a unique message being received

23
Q

Management Information Base (MIB)

A

The structure of the management data of a device subsystem using hierarchical namespace containing object identifiers; don’t send redundant info just changes

24
Q

Verbose

A

SNMP traps may be configured to contain all the information

25
Q

SNMPv3

A

Provides three security enhancements which added integrity, authentication and confidentiality to the SNMP protocol

26
Q

System Logging Protocol (Syslog)

A

Sends system log or even messages to a central server, called a syslog server

27
Q

Syslog level 0

A

emergency

28
Q

1

A

Alert

29
Q

2

A

Critical

30
Q

3

A

Error

31
Q

Warning

A

4

32
Q

5

A

Notice

33
Q

Information

A

6

34
Q

Debugging

A

7