Chapter 6 Flashcards

(79 cards)

1
Q

a set of rules to permit or restrict data from flowing into or out of a network

A

access control list (ACL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

a configuration in which all load balancers are always active

A

active-active

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

a configuration in which the primary load balancer distributes the network traffic to the most suitable server while the secondary load balancer operates in a “listening mode.”

A

active-passive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

a scheduling protocol that distributes the load based on which devices can handle the load more efficiently.

A

affinity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

a network access control (NAC) agent that is not installed on an endpoint device but is embedded within a microsoft windows active directory domain controller

A

agentless NAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

the absence of any type of connection between devices.

A

air gap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A VPN that allows the user to always stay connected instead of connecting and disconnecting from it.

A

always-on VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

a monitoring technique used by an intrusion detection system (IDS) that creates a baseline of normal activities and compares actions against the baseline. Whenever there is a significant deviation from this baseline, an alarm is raised.

A

anomaly monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A defense used to protect against IP spoofing that imitates another computer’s IP address.

A

antispoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A special proxy server that “knows” the application protocols that is supports.

A

application/multipurpose proxy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

a firewall that functions at the OSI application layer

A

application-based firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A monitoring technique used by an intrusion detection system (IDS) that uses the normal processes and actions as the standard and compares actions against it.

A

behavioral monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A hardware device or software that is used to join two separate computer networks to enable communication between them.

A

bridge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A system of security tools that is used to recognize and identify data that is critical to the organization and ensure that it is protected.

A

data loss prevention (DLP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A separate network that rests outside the secure network perimeter: untrusted outside users can access the DMZ but cannot enter the secure network.

A

demilitarized zone (DMZ)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A network access control (NAC agent that disappears after reporting information to the NAC device.

A

dissolvable NAC agent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A private network that can also be accessed by authorized external customers, vendors, and partners.

A

extranet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

the failure to raise an alarm when there is abnormal behavior

A

false negative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

alarm that is raised when there is no actual abnormal behavior.

A

false positive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

hardware or software that is designed to limit the spread of malware.

A

firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A defense against a MAC flooding attack. see also port security.

A

flood guard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

a computer or an application program that intercepts user requests from the from the internal secure network and then processes those requests on behalf of the users.

A

forward proxy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A VPN technology in which all traffic is sent to the VPN concentrator and is protected.

A

full tunnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A separate open network that anyone can access without prior authorization.

A

guest network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
A dedicated cryptographic processor that provides protection for cryptographic keys.
hardware security module (HSM)
26
A monitoring technique used by an intrusion detection system (IDS) that uses an algorithm to determine if a threat exists.
heuristic monitoring
27
Reports sent by network access control (NAC) "agents" installed on devices to gather information and report back to the NAC device
host agent health checks
28
A software firewall that runs as a program on a local computer to block or filter traffic coming into and out of the computer.
host-based firewall
29
A software-based application that runs on a local host computer that can detect an attack as it occurs.
host-based intrusion detection system (HIDS)
30
A technology that monitors a local system to immediately react to block a malicious attack.
host-based intrusion prevention system (HIPS)
31
a more recent and advanced electronic email system for incoming mail.
IMAP ( internet mail access protocol)
32
the principle of being always blocked by default.
implicit deny
33
an intrusion detection system (IDS) implemented through the network itself by using network protocols and tools.
in-band IDS
34
an intrusion detection system (IDS) that is directly connected to the network and monitors the flow of data as it occurs
inline IDS
35
a private network that belongs to an organization that can only be accessed by approved internal users.
intranet
36
a device that detects an attack as it occurs.
Intrusion detection system (IDS)
37
a dedicated network device that can direct requests to different servers based on a variety of factors.
load balancer
38
a means to mitigate broadcast storms using the IEEE 802.1d standard spanning-tree algorithm (STA)
loop prevention
39
A system that monitors emails for unwanted content and prevents these messages from being delivered.
mail gateway
40
A device that converts media data from one format to another.
media gateway
41
A technique that examines the current state of a system or network device before it can connect to the network.
network access control (NAC)
42
a technique that allows private IP addresses to be used on the public internet.
network address translation (NAT)
43
A technology that watches for attacks on the network and reports back to a central device.
network intrusion detection system (NIDS)
44
A technology that monitors network traffic to immediately react to block a malicious attack.
prevention system (NIPS)
45
a firewall that functions at the OSI network layer (Layer 3)
network-based firewall
46
An intrusion detection system (IDS) that uses an independent and dedicated channel to reach the device.
out-of-band IDS
47
An intrusion detection system (IDS) that is connected to a port on a switch in which data is fed to it.
passive IDS
48
A network access control (NAC) agent that resides on end devices until uninstalled.
permanent NAC agent
49
Isolating the network so that it is not accessible by outsiders.
physical network segregation
50
a flood guard technology that restricts the number of incoming MAC addresses for a port
port security
51
an earlier mail system responsible for incoming mail.
post office protocol (POP)
52
A user-to-LAN VPN connection used by remote users.
remote access VPN
53
A proxy that routes requests coming from an external network to the correct internal server.
reverse proxy
54
a scheduling protocol rotation that applies to all devices equally
round-robin
55
a device that can forward packets across computer networks.
router
56
A product that consolidates real-time monitoring and management of security information with analysis and reporting of security events.
security and information event management (SIEM)
57
a SIEM feature that combines data from multiple data sources (network security devices, servers, software applications, etc.) to build a comprehensive picture of attacks.
SIEM aggregation
58
A SIEM feature that can inform security personnel of critical issures that need immediate attention.
SIEM automated alerting and triggers
59
A SIEM feature that searches the data acquired through SIEM aggregation to look for common characteristics, such as multiple attacks coming from a specific source.
SIEM correlation
60
A SIEM feature that can help filter the multiple alerts into a single alarm.
SIEM event duplication
61
A SIEM feature that records events to be retrained for future analysis and to show that the enterprise has complied with regulations.
SIEM logs
62
A SIEM feature that can show the order of the events.
SIEM time synchronization
63
A monitoring technique used by an intrusion detection system (IDS) that examines network traffic to look for well-known patterns and compares the activities against a predefined signature.
signature-based monitoring
64
an earlier email system that handles outgoing mail.
simple mail transfer protocol (SMTP)
65
A VPN connection in which multiple sites can connect to others sites over the internet
site-to-site VPN
66
a VPN technology in which only some traffic is sent to the VPN concentrator and is protected while other traffic directly access the internet.
split tunneling
67
a spearate device that decrypts SSL traffic
SSL decryptor
68
a separate hardware card thatinserts into a web server that contains one or more co-processors to andle SSL/TLS processing
SSL/TLS accelerator
69
a firewall that keeps a record of the state of a connection between an internal computer and an external device and then makes decisions based on the connection as well as the conditions
stateful packet filtering
70
a firewall that looks at the incoming packet and permits or denies it based on the conditions that have been set by the administraitor
stateless packet filtering
71
a device that connects network segments and forwards only frames intended for that specific device or frames sent to all devices.
switch
72
a proxy that does not require any configurathion on the user's comuter
transparent proxy
73
an integrated device that combines several security functions
Unified Threat management (UTM)
74
a data loss prevention (DLP) technique for blocking the copying of files to a USB flash drive
USB blocking
75
An IP address and a specific port number that can be used to reference different physical servers.
virtual IP (VIP)
76
a technology that allows scattered users to be logically grouped together ever though they may be attached to different switches.
virtual LAN (VLAN)
77
A technology that enables use of an unsecured public network as if it were a secure private network.
virtual private network (VPN)
78
a device that aggregates hundreds of thousands of VPN connections.
VPN conentrator
79
a firewall that filters by examining the applications using HTTP.
web application firewall