IS3220 CHAPTER 15 Flashcards Preview

IS3220 NETWORK SECURITY, FIREWALLS, & VPNS > IS3220 CHAPTER 15 > Flashcards

Flashcards in IS3220 CHAPTER 15 Deck (25):
1

Refers ot a series of tools and techniques used to prevent forensic examination from identifying an attack or attacker and is called ___?

ANTI-FORENSICS

2

A distributed data protection technology that leverages deep analysis, context evaluation, and rules configured from a central console to ensure confidential information remains secure while in use, in transit, and at rest. This is called ___?

DATA LEAKAGE PREVENTION (DLP)

3

Identifying, extracting, and evaluating evidence obtained from digital media such as computer hard drives, CDs, DVDs, and other digital storage devices is called ___?

DIGITAL FORENSIC TECHNIQUES

4

A set of concepts and practices that provide detailed descriptions and comprehensive checklists, tasks and procedures for common IT practices. This is based on the ISO 27002 Standard and is called ____?

INFORMATION TECHNOLOGY INFRASTRUCTURE LIBRARY (ITIL)

5

Specialized host used to place an attacker into a system where the intruder cannot do any harm is called ___?

PADDED CELL

6

1. Pick the two common IDS/IPS deployment models:

1. Bypass
2. Unfiltered
3. Tunneled
4. Intranet
5. Screened

Unfiltered

Screened

7

2. Which of the following are types of specialized firewalls?

1. Data protection
2. Host
3. Application
4. Hybrid
5. Network

Data protection
Application
Hybrid

8

3. Two technologies used to identify attack techniques and patterns include ___ and ___.

honeypots and honeynets

9

4. Techniques used to counter digital investigations are known as ___.

anti-forensics

10

5. Pick the two changing areas to watch when developing your information security road map.

1. Security industry focus
2. Vendors
3. Computer processing power
4. Cloud computing
5. Network design

Security industry focus
Cloud computing

11

6. The technique of hiding a secret message in plain sight is known as ___.

steganogrophy

12

7. Which of the following is a potential disadvantage of IPv6 from a security perspective?

1. Additional address space
2. Less flexible than IPv4
3. Industry support
4. Maturity of the standard
5. Ubiquitous encryption

Ubiquitous encryption

13

8. Identifying a user based on anatomical characteristics is known as ___.

biometrics

14

9. Which of the following are biometric characteristics

1. Default password
2. Fingerprint
3. Iris pattern
4. Voice print
5. Token

Fingerprint
Iris pattern
Voice print

15

10. Which of the following are considered complementary technologies to an IDS/IPS implementation?

1. Honeypot
2. Encryption
3. VPN
4. Padded cell
5. Virtual firewall

Honeypot
Padded cell

16

11. A device that monitors network traffic and alerts during an attack is an ___.

IDS or IPS

17

12. A device that monitors network traffic and alerts and takes action without manual intervention during an attack is an ___.

IPS

18

13. Which of the following contribute to the erosion of the network perimeter?

1. Specialized firewalls
2. VPN
3. IPS/IDS
4. Cloud computing
5. Business partner connections

VPN

Cloud computing

Business partner connections

19

14. The act of ensuring your company obeys intern policies and any applicable laws is known as ___.

compliance

20

15. The processes and procedures used to ensure employees are following corporate security policies are known collectively as ___.

governance

21

16. Identify one risk associated with the use of a public wireless connection.

1. Encryption
2. Virus
3. Data interception
4. Data corruption
5. Social engineering

Data interception

22

17. What is one advantage to commercial security solutions that might make a company select them over open-source equivalents?
1. Flexibility
2. Support
3. Cost
4. Availability
5. Value

Support

23

18. Which of the following might be included in a risk register?

1. Risk description
2. Impact
3. Cost
4. Business owner
5. Continuity planning

Risk description

Impact

Business owner

24

19. Which of the following are considered core security principles when discussing the uses of security technologies?

1. Confidentiality
2. Governance
3. Integrity
4. Risk
5. Compliance

Confidentiality

Integrity

25

20. When an IDS detects an attack it can direct the attacker to a host where the attacker cannot do any damage. This host is known as a ___.

padded cell