Chapter 7 Flashcards

1
Q

network perimeter

A

The border of a computer network, commonly secured by devices
such as firewalls and NIDS/NIPS solutions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

explicit allow

A

When an administrator sets a rule that allows a specifi c type of traffi c
through a fi rewall, often within an ACL.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

explicit deny

A

When an administrator sets a rule that denies a specific type of traffic access
through a firewall, often within an ACL.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

implicit deny

A

Denies all traffic to a resource unless the users generating that traffic
are specifi cally granted access to the resource.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

packet filtering

A

In the context of firewalls, inspects each packet passing through the
fi rewall and accepts or rejects it based on rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

stateful packet inspection (SPI)

A

Type of packet inspection that keeps track of network
connections by examining the header in each packet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

application-level gateway (ALG)

A

Applies security mechanisms to specifi c applications,
such as FTP and/or BitTorrent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

circuit-level gateway

A

Works at the Session Layer of the OSI model and applies security
mechanisms when a TCP or UDP connection is established; acts as a go-between
for the Transport and Application Layers in TCP/IP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

IP proxy

A

Secures a network by keeping machines behind it anonymous; it does this
through the use of NAT.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

HTTP proxy

A

Caches web pages from servers on the Internet for a set
amount of time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

web security gateway

A

An intermediary that can scan for viruses and fi lter Internet
content.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

honeynet

A

One or more computers, servers, or an area of a network, used to attract and
trap potential attackers to counteract any attempts at unauthorized access of the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

data loss prevention (DLP)

A

Systems that are designed to protect data by way of content
inspection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

promiscuous mode

A

n a network adapter, this passes all traffi c to the CPU, not just the
frames addressed to it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

false positive

A

When a system authenticates a user who should not be allowed access to
the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

false negative

A

When a system denies a user who actually should be allowed access to
the system