Misc Implementation Flashcards

1
Q

Too many passwords to remember?

A

Password vault

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Split-tunnel VPN

A

Sends only traffic destined for the remote network over the VPN, with all other traffic split away to use the VPN system or a user’s primary network connection. This reduces overall traffic sent through the VPN but means that traffic cannot be monitored and secured via the VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Hardening

A

the process of improving the security of an operating system or application. One of the primary methods of hardening a trusted OS is to eliminate unneeded protocols. This is also known as creating a secure baseline that allows the OS to run safely and securely

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

OpenID

A

an authentication service often done by a third party, and it can be used to sign into any website that accepts OpenID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Kerberos

A

a network authentication protocol for use within a domain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Shibboleth

A

Single sign-on system that works with federated systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Line of sight?

A

Infrared

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Storm control

A

Enabling storm control on a switch will limit the amount of total bandwidth that broadcast packets can use, preventing broadcast storms from taking down the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

firewall

A

stops traffic based on rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Fuzzing

A

a technique whereby the tester intentionally enters incorrect values into input fields to see how the application will handle it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Loop protection

A

sends packets that include a PDU, or protocol data unit. These are detected by other network devices and allow the network devices to shut down ports from which they receive those packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Stateful packet filtering firewall

A

A stateful inspection firewall examines the content and context of each packet it encounters. This means that a stateful packet inspection (SPI) firewall understands the preceding packets that came from the same IP address, and thus the context of the communications. This makes certain attacks, like a SYN flood, almost impossible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

ad hoc wireless network

A

operate on point-to-point topology (star and bus models are used in wired networks)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What channels do NOT cause issues with channel overlap or overlap in U.S. installations of 2.4 GHz Wi-Fi networks?

A

1, 6, 11. Other channels will overlap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Jump box

A

a common solution for providing access to a network with a different security profile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the size of the wrapper TKIP places around the WEP encryption with a key that is based on things such as the MAC address of your machine and the serial number of the packet?

A

TKIP places a 128-bit wrapper around the WEP encryption with a key that is based on things such as the MAC address of the host device and the serial number of the packet

17
Q

Samantha is looking for an authentication method that incorporates the X.509 standard and will allow authentication to be digitally signed. Which of the following authentication methods would BEST meet these requirements?

A

Digital certificates use the X.509 standard (or the PGP standard) and allow the user to digitally sign authentication requests.

18
Q

Isabel is responsible for security at a mid-sized company. She wants to prevent users on her network from visiting job-hunting sites while at work. Which of the following would be the BEST device to accomplish this goal?

A

Proxy Server - A web proxy can be used to block certain websites. It is common practice for network administrators to block either individual sites or general classes of sites (like job-hunting sites).

19
Q
A