Chapter 10 Flashcards

1
Q

When you divide a network into multiple smaller networks

A

Network Segmentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Mechanism for maintaining control over the traffic that flows into and out of a network

A

Firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

IDS

A

Intrusion Detection Systems (IDS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Hardware or software tools that monitor networks, hosts, or applications for unauthorized activity

A

Intrusion Detection Systems (IDS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

IPS

A

Intrusion Prevention Systems (IPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Refuses traffic from the source of an attack

A

Intrusion Prevention Systems (IPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Works like most antivirus systems

A

Signature-Based IDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Works by first determining the normal kinds of traffic and activity taking place on a network and then measuring the present traffic against the baseline in order to detect patterns that aren’t present inn the traffic normally.

A

Anomaly-Based IDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the method of protecting the traffic that flows through a network?

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

WEP

A

Wired Equivalent Privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

WPA, WPA2, WPA3

A

Wi-Fi Protected Access
Wi-Fi Protected Access 2
Wi-Fi Protected Access 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

VPN

A

Virtual Private Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The simplest and easiest way to protect our data

A

Secure Protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

FTP

A

File Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

POP

A

Post Office Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Used to detect wireless access points. Can find them even when attempts have been made to make doing so difficult

17
Q

A handy tool for securing communications

A

Secure Shell (SSH)

18
Q

SSH

A

ecure Shell

19
Q

Used for discovering the networks and systems in an environment

A

Port Scanner

20
Q

Nmap (A port scanner)

A

Network Mapper

21
Q

A tool that can intercept traffic on a network. Listens for any traffic that your computer or device’s network interface can see.

A

Packet Sniffer

22
Q

A fully featured sniffer capable of intercepting traffic from a wide variety of wired and wireless sources

23
Q

A command-line packet sniffing tool

24
Q

Detects, monitors, and sometimes tampers with the activities of an attacker. (Creating fake vulnerabilities that would make the system attractive to an attacker)

25
Expanded Honeypots (Networks of Honeypots)
Honeynets
26
ICMP
Internet Control Message Protocol
27
A tool that can map the topology of firewalls and help locate vulnerabilities in them
Scapy (hping3?)