C836 Ch.10 Flashcards

1
Q

Security in network design

A

This method of security involves a well-configured and patched network, and incorporating elements such as network segmentation, choke points, and redundancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Network segmentation

A

The act of dividing a network into multiple smaller networks, each acting as its own small network (subnet)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Choke points

A

Certain points in the network, such as routers, firewalls, or proxies, where we can inspect, filter, and control network traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Redundancy

A

A method of security that involves designing a network to always have another route if something fails or loses connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Firewall

A

A mechanism for maintaining control over the traffic that flows into and out of our networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Packet filtering

A

A firewall technology that inspects the contents of each packet in network traffic individually and makes a gross determination (based on source and destination IP address, port number, and the protocol being used) of whether the traffic should be allowed to pass

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Stateful packet inspection

A

A firewall technology that functions on the same general principle as packet filtering firewalls, but is able to keep track of the traffic at a granular level. Has the ability to watch the traffic over a given connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Deep packet inspection

A

A firewall technology that can analyze the actual content of the traffic that is flowing through

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Proxy server

A

A specialized type of firewall that can serve as a choke point, log traffic for later inspection, and provide a layer of security for the devices behind it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Demilitarized Zone (DMZ)

A

A combination of a network design feature and a protective device such as a firewall; often used for systems that need to be exposed to external networks but are connected to our network (such as a web server)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Network intrusion detection system (NIDS)

A

A system that monitors the network to which it is connected for unauthorized activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Signature-based IDS

A

An intrusion detection system that maintains a database of signatures that might signal a particular type of attack and compares incoming traffic to those signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Anomaly-based IDS

A

An intrusion detection system that takes a baseline of normal network traffic and activity and measures current traffic against this baseline to detect unusual events

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Bring your own device (BYOD)

A

A phrase that refers to an organization’s strategy and policies regarding the use of personal vs. corporate devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Mobile device management (MDM)

A

A solution that manages security elements for mobile devices in the workplace

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Kismet

A

A well-known Linux tool used to detect wireless access points

17
Q

NetStumbler

A

A Windows tool used to detect wireless access points

18
Q

Nmap

A

A well-known port scanner that can also search for hosts on a network, identify the operating systems those hosts are running, and detect the versions of the services running on any open ports

19
Q

Packet sniffer

A

Also known as a network or protocol analyzer, this type of tool can intercept traffic on a network

20
Q

Wireshark

A

A fully featured sniffer that is also a great tool for troubleshooting traffic; this well-known tool is used by many network operations and security teams

21
Q

Honeypot

A

A type of tool that deliberately displays vulnerabilities or attractive data so it can detect, monitor, and sometimes tamper with the activities of an attacker

22
Q

Hping3

A

A tool that can map the network topology and help locate firewall vulnerabilities