2.0 Tools and Technologies Flashcards

(86 cards)

1
Q

A table or data file that specifies whether a user or group has access to a specific resource on a computer or network.

A

ACL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A combination of hardware and software filters placed between trusted and untrusted networks intended to protect a network from attack by hackers who could gain access through public networks, including the Internet.

A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A condition that states that unless otherwise given, the permission will be denied.

A

Implicit deny

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Firewall that filters packets based on the full context of a given network connection.

A

Stateful Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Firewall that is designed to protect networks based on static information such as source and destination.

A

Stateless Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Firewall that are designed to protect the public-facing servers providing specific applications

A

Application-based Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Firewall that controls traffic going in and out of a network.

A

Network-based Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A set of protocols that enable encryption, authentication, and integrity over IP. IPSec is commonly used with virtual private networks (VPNs) and operates at Layer 3.

A

IPSec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

An IPSec header used to provide connectionless integrity and data origin authentication for IP datagrams and to provide protection against replays.

A

Authentication Header (AH)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A technology used to securely connect to an organization’s internal network by tunneling unsecure protocols and data over a secure connection through an unsecure external network, such as the internet, to secure a device.

A

VPN (Virtual Private Network)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

An IPSec header used to provide a mix of security services in IPv4 and IPv6. ESP can be used alone or in combination with the IP Authentication Header (AH).

A

ESP (Encapsulating Security Payload)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A system that is not only responsible for detecting network attacks based upon certain traffic characteristics, but also has the ability to prevent and stop attacks upon detection.

A

NIPS (Network Intrusion Prevention System)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A system that detects network attacks based upon certain traffic characteristics.

A

NIDS (Network Intrusion Detection System)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A system that uses signatures to scan for attacks or viruses and then alerts the administrator.

A

Signature-based System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A system that relies on an established pattern of behavior, typically through the establishment of a usage baseline, in order to detect unusual patterns, such as network attacks or misuse.

A

Heuristic/Behavioral Based System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A system that relies on an established pattern of behavior, typically through the establishment of a usage baseline, in order to detect unusual patterns, such as network attacks or misuse.

A

Anomoly/Behavioral Based System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A system that combines the best of both anomoly-based and signature-based systems.

A

Heuristic Based System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A flagged event that isn’t really an event and has been falsely triggered.

A

False Positive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

An event that should be flagged but isn’t.

A

False Negative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A hardware device used to connect physically separate local area networks. These devices direct traffic based upon logical Internet protocol addresses, and also eliminate broadcast domains, since broadcasts cannot normally cross router connections to different networks.

A

Router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A method used on some routers to protect against spoofing attacks . A common implementation is to implement specific rules to block certain traffic.

A

Antispoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A network device that can replace a router or hub in a local network and get data from a source to a destination. Switching allows for higher speeds.

A

Switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

The “Data Link Layer” identifies devices on the physical layer.
MAC addresses and Bridges operate at the Data Link Layer

A

Layer 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

The “Network Layer” moves packets between computers on different networks.
Routers, IP, IPX operate at the “Network Layer”

A

Layer 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
A method of preventing switching loop or bridge loop problems. STP and RSTP prevent switching loops.
Loop Prevention
26
A structuire of thwarting flood attacks. On Switches, a flood guard thwarts MAC flood attacks. On routers, a flood guard prevents SYN Flood Attacks.
Flood Guard
27
A type of system that prevents direct communication between a client and a host by acting as an intermediary.
Proxy
28
A device or software that recognizes application-specific commands and offers granular control over them.
Application Proxy
29
Dividing a load for greater efficiency of management among multiple devices.
Load Balancer
30
Scheduling method used with load balancers. It uses client IP addresses to ensure the client is redirected to the same server during a session.
Affinity
31
Scheduling method used with load balancers. It redirects each client request to servers in a predetermined order.
Round-Robin
32
The point at which access to a network is accomplished. This term is often used in relation to a wireless access point (WAP).
AP (Access Point)
33
The Service Set Identifier (SSID) is used by the access point of a wireless LAN to identify itself and is intended to be unique for a particular area/entity on a network.
SSID
34
Form if NAC to allow or block access based on the MAC address. Its configured on switches for port security or on AP's for wireless security.
MAC Filtering
35
Refers to the technologies and products used to integrate security information management and security event management information into a centralized interface, providing real-time event correlation and analysis.
SIEM (Security Information and Event Management)
36
A switch used to connect multiple switches together into a network. Switches connect to the aggregation switch and it connects to a router.
Aggregation Switch
37
A self replicating malware that travels through a network. They do not need user interaction to execute.
WORM
38
Software or techniques designed to detect attempts to exfiltrate data.
DLP (Data Loss Prevention)
39
Solutions specifically protect organizations that have adopted cloud storage by ensuring sensitive data does not make its way into the cloud without first being encrypted and is only sent to authorized cloud applications.
Cloud-Based DLP
40
The set of standards defined by the network for clients attempting to access it. Usually, NAC requires that clients be virus free and adhere to specified policies before allowing them on the network.
NAC (Network Access Control)
41
A NAC agent that runs on a client, but deletes itself later. It checks the client for healt.
Dissolvable Agent
42
A NAC that is installed on a client permanently. It checks for client health.
Permanent Agent
43
A process that scrambles, or ciphers, data to make it unreadable. Usually includes a public algorithm and a private key.
Encryption
44
A network device used to connect multiple networks together. It can be used other than a router in some situations.
Bridge
45
A server that examines and processes all incoming and outgoing emails. It typically includes a spam filter and DLP capabilities.
Mail Gateway
46
A software or hardware tool that has the capability to collect and analyze network traffic information.
Protocol Analyzer/Packet Analyzer
47
A tool that enumerates your network and provides a map of the network.
Network Scanner
48
A process used to discover devices on a network, including how they are connected.
Network Mapping
49
A network scanner that scans wireless frequency bands.
Wireless Scanner
50
Identifying specific vulnerabilities in your network.
Vulnerability Scanner
51
The practice of hiding data within data.
Steganography
52
A fake system designed to divert attackers from your real systems. It is often replete with logging and tracking to gather evidence.
Honeypot
53
A network that functions in the same manner as a honeypot.
Honeynet
54
A method used to gain information about a remote system. It identifies the operating system and other details on the remote system.
Banner Grabbing
55
Command line tool used to test connectivity with remote systems.
ping
56
A command line tool used to show network statistics on a system.
netstat
57
A command line tool used to trace the route between two systems.
tracert
58
A command line tool used to test DNS on Microsoft systems.
nslookup/dig
59
A command line tool used to show and manipulate the ARP Cache.
arp
60
A command line tool used on Windows Systems to show the configuration settings on a NIC.
ipconfig
61
A command line tool used on Linux systems to show and manipulate setting on a network interface card.
ifconfig
62
A command line protocol analyzer. Administrators use it to capture packets.
tcpdump
63
A command line tool used to scan networks. A type of network scanner.
nmap
64
A command line tool used to connect remote systems.
netcat
65
An intrusion detection system that is host based. An alternative is an intrusion detection system that is network based.
HIDS (Host-Based Intrusion Detection System)
66
An intrusion prevention system that is host based. An alternative is an intrusion prevention system that is network based.
HIPS (Host-Based Intrusion Prevention System)
67
Software that identifies the presence of a virus and is capable of removing or quarantining the virus.
Antivirus
68
The concept of implementing multipurpose security devices that perform a wide variety of functions, including firewall, proxy, VPN, and data loss prevention functions.
UTM (Unified Threat Management)
69
A communication system that allows devices to connect to a satellite for communications.
SATCOM (Satellite Communications)
70
A practice where mobile devices are configured to alert the administrator if they are removed from a particular area, such as the business campus.
Geofencing
71
The location of a device identifies by GPS. It can help locate a lost or stolen mobile device.
Geolocation
72
Mobile device environment in which employees are allowed to use their personally owned devices to access. store. and process data belonging to the organization.
BYOD (Bring Your Own Device)
73
A mobile device deployment model. The organization purchases and issues devices to employees.
COPE (Corporate Owned/Personally Enabled)
74
A mobile device deployment model. Employees can connect their personally owned device to the network as long as the device is on a pre-approved list.
CYOD (Choose Your Own Device)
75
Users access a server hosting virtual desktops and run the desktop operating system from the server.
VDI (Virtual Desktop Infrastructure)
76
A suite of security extensions proposed and and used by the U.S. government and other entities that allows for secure Domain Name System (DNS) queries and zone transfers.
DNSSEC (DNS Security Extenstions)
77
A secure remote connection/terminal emulation program that is not only a protocol but also a suite of secure utilities.
SSH (Secure Shell)
78
Secure version of the Multipurpose Internet Mail Extensions (MIME) protocol built into every e-mail client that enables users to make e-mail attachments.
S/MIME (Secure MIME)
79
A protocol used to encrypt and provide authentication for Real-time Transport Protocol (RTP) traffic. Used for audio/video streaming.
SRTP (Secure Real-time Transport Protocol)
80
A protocol that us used in distributed directory services networks such as Active Directory, to assist hosts in locating network resources.
LDAP (Lightweight Directory Access Protocol)
81
An application-level protocol used to transfer files from one host to another.
FTP (File Transfer Protocol)
82
An extension of Secure Shell (SSH) used to encrypt FTP traffic.
SFTP (Secure File Transfer Protocol)
83
A protocol used to monitor and manage network devices such as routers and switches.
SNMPv3 (Simple Network Management Protocol Version 3)
84
Used to encrypt data-in-transit with the use of certificates.
SSL/TLS (Secure Sockets Layer)
85
A protocol usedd to encrypt HTTP traffic.
HTTPS (Hypertext Transfer Protocol Secure)
86
One of two client-level e-mail protocols that receive e-mail from SMTP servers.
Secure POP/IMAP