5a - Network Security Flashcards

(48 cards)

1
Q

Uses duplication of critical components/devices, increasing the reliability of the system.

A

Redundancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Eliminates a single point of power failure within the network.

A

Redundant power

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Comes in various sizes and can sustain network operations for only a limited time in the event of an outage.

A

UPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Provides incremental trunk speeds by combining multiple interfaces to act as one link.

A

Link Aggregation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Used primarily on Cisco switches;
Allows multiple physical ethernet links to combine into one logical channel.

A

EtherChannel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Lets you monitor network nodes from a management server.

A

SNMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

SNMPv1

A

Operates over UDP, IP, OSI CLNS, DDP, and IPX

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

SNMPv2

A

Revises v1 and improves on security, confidentiality, and manager-to-manager communications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SNMPv3

A

Added security and remote configuration to SNMP;
The preferred version and required on AF networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Any program or code designed to do something on a system or network that you don’t want to have happen.

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A program that has two jobs: replicate and activate.

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Replicates exclusively through networks.

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Can be embedded into a program file and automatically runs when the file is opened.

A

Macro Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A piece of malware that looks or pretends to do one thing while doing something bad.

A

Trojan horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Usually a trojan horse that takes advantage of very low-level operating system functions to hide from all but the most aggressive of antimalware tools.

A

Rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A program that monitors the types of websites you frequent and uses that information to generate targeted advertisements.

A

Adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A function of any program that sends information about your system or your actions over the Internet.

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The process of using or manipulating people inside the network environment to gain access to that network from the outside.

A

Social Engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

When the attacker poses as some trusted site, such as your bank, so you could put in your personal information.

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A type of phishing that targets specific individuals or groups within an organization.

A

Spear phishing

21
Q

A highly targeted phishing attack aimed at senior executives masquerading as a legitimate email.

22
Q

When a person goes through the trash in order to find personal information.

A

Dumpster diving

23
Q

When a person inserts themselves into a conversation between two others, covertly intercepting traffic thought to be only between two people.

A

Man in the middle attack

24
Q

Floods the network with so many requests that it becomes overwhelmed and stops functioning.

A

DoS
Denial of Service

25
Using another person's network without permission.
Leeching
26
Four types of encryption
WEP, WPA, WPA2, and WPA3
27
An unauthorized WAP installed on the network.
Rogue access point
28
A rogue access point that looks like a legitimate access point.
Evil twin
29
Occurs when a user identifies themselves to the system, and the identity is verified against an authentication database.
Authentication
30
Occurs after the user has been authenticated.
Authorization
31
The tracking of network and resource usage on the network.
Accounting
32
States what users are allowed and not allowed to do on the company's network.
Acceptable Use Policy (AUP)
33
Protect networks from potential attacks outside the network by filtering packets using a number of methods.
Firewalls
34
Permits or denies access to the network based on the MAC address of the client.
MAC address filtering
35
Like MAC address filtering, except filtering is based on IP addresses instead of MAC addresses.
IP Address filtering / Packet filtering
36
Prevents the passage of any TCP or UDP segments/datagrams through any port other than the ones prescribed by the system administrator.
Port filtering
37
A method used by firewalls to prevent a hacker from gaining access to the real IP address.
Hiding the real IP address
38
A software utility that detects, prevents, and removes viruses, worms, and other malware from a computer.
Anti virus
39
Software tools and programs designed to identify and prevent malicious software, or malware, from infecting computer systems or electronic devices.
Anti-malware software
40
Inspects incoming packets looking for active intrusions; does NOT take any actions to stop the attack.
Intrusion Detection System IDS
41
Similar to IDS, but adds the capability of actively prevent intrusions.
Intrusion Prevention System IPS
42
Proactively identifies security vulnerabilities of computing systems in a network to determine if and where a system can be exploited and/or threatened.
Vulnerability scanners
43
The name assigned to a wi-fi network; a text string that is up to 32 bytes long.
SSID
44
A security access control method whereby the 48-bit address assigned to each wireless NIC is used to determine access to the network.
MAC address filtering
45
A security algorithm for IEEE 802.11
WEP Wired Equivalent Privacy
46
An intermediate measure to take the place of WEP.
WPA
47
Implements the mandatory elements of IEEE 802.11i.
WPA2
48
Adds better protection from brute-force dictionary attacks and adds individualized data encryption.
WPA3