2.0 - Basic Network Security Concepts Flashcards

(28 cards)

1
Q

SAFE stands for…

A

Security Access For Everyone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What’s a PIN?

A

Place In (your) Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A forward proxy services requests from _____.

A

Internal users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A reverse proxy services requests from ____.

A

External users on the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

True or false: reverse proxy servers can be the termination point for SSL/TLS connections.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Cisco WSA?

A

Web Security Appliance, either a hardware or software proxy server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An IDS is not placed inline with the flow of traffic. Therefore…

A

it does not prevent malicious activity, merely detects it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An IDS/IPS installed on a server would be considered _____, whereas an IDS/IPS placed in front of a firewall would be considered _____.

A

host-based, network-based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is signature-based detection?

A

Using a database of known attack signatures or patterns to identify malicious activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are secure domains?

A

Concepts - management, security intelligence, compliance, segmentation, threat defense, and secure services.

SAFE key concept, p. 103

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

AES-256 is a/an _______ algorithm.

A

encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

SHA-256 is a/an _______ algorithm.

A

hashing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

When a VPN sequences the packets in the flow, this is an example of _____.

A

anti-replay protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Name two secure tunnel protocols.

A

IPSec and SSL/TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Cisco AnyConnect?

A

Host-based remote-access VPN software. Also known as Cisco Secure Client.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does ESP provide that AH does not?

17
Q

Which protocol is used in IPSec over the internet, AH or ESP?

18
Q

Explain the fundamental difference between IPSec tunnel mode and transport mode.

A

In transport mode, the original IP header is left unencrypted. In tunnel mode, it is encrypted and a new IP header is added.

19
Q

A device which “monitors and controls incoming and outgoing network traffic based on predefined security rules and policies” is a _____.

20
Q

Cisco Firepower is what?

A

a next-generation firewall

21
Q

AMP, a feature of next-gen firewalls, stands for what?

A

Advanced Malware Protection

22
Q

“C2” refers to what?

A

Command and Control, a hacking term

23
Q

What is Cisco ISE and what service does it provide?

A

Identity Services Engine, and it provides network access control (NAC) services

24
Q

What is Cisco TrustSec?

A

a security framework that enables group-based access control

25
What is WPA3 Enhanced Open used for?
It provides encryption without authentication on public wifi networks.
26
What is WPS?
Wifi Protected Setup, a method for users to connect to wifi using a PIN. It is considered a security risk and should be disabled.
27
What is war driving?
Driving around looking for wifi signals which can be later exploited.
28
What is a rainbow table?
A table of preconfigured hash values for different passwords.