Chapter 2: Monitoring and Diagnosing Networks Flashcards

1
Q

A network segment between two firewalls. One is outward facing, connected to the outside world, the other inward facing, connected to the internal network. Public-facing servers, such as web servers, are often placed in this.

A

Demilitarized Zone (DMZ)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A network that functions in the same manner as a honeypot.

A

Honeynet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A fake system designed to divert attackers from our real systems. It is often replete with logging and tracking to gather evidence.

A

Honeypot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A broad term that applies to a wide range of systems used to manage information security.

A

Information Security Management System (ISMS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A system that monitors the network for possible intrusions and logs that activity.

A

Intrusion Detection System (IDS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Any information that could identify a particular individual.

A

Personally Identifiable Information (PII)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The entire network, including all security devices, is virtualized.

A

Software-Defined Network (SDN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A firewall that not only examines each packet but also remembers the recent previous packets.

A

Stateful Packet Inspection (SPI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which ISO standard is a guidance for cloud security?

A

ISO 27017

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What seven controls does ISO 27017 add to ISO 27002?

A
  • CLD.6.3.1
  • CLD.8.1.5
  • CLD.9.5.1
  • CLD.9.5.2
  • CLD.12.1.5
  • CLD.12.4.5
  • CLD.13.1.4
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

This is an agreement on shared or divided security responsibilities between the customer and cloud provider.

A

CLD.6.3.1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

This control addresses how assets are returned or removed from the cloud when the contact is terminated.

A

CLD.8.1.5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

This control states that the cloud provider must separate the customers’ virtual environment from other customers or outside parties.

A

CLD.9.5.1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

This control states that the customer and the cloud provider both must ensure the virtual machines are hardened.

A

CLD.9.5.2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Control that states it is solely the customer’s responsibility to define and manage administrative operations.

A

CLD.12.1.5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The cloud provider’s capabilities must enable the customer to monitor their cloud environment.

A

CLD.12.4.5

17
Q

The virtual network environment must be configured so that it least meets the security policies of the physical environment.

A

CLD.13.1.4

18
Q

Corporation that publishes standards for electrical power companies.

A

North American Electric Reliability Corporation (NERC)