Lesson3 Flashcards

(17 cards)

1
Q

Process of securing information data from unauthorized access

A

Information Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Mechanism for maintaining control over the traffic

A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Through certain points where we can inspect, filter, and control the traffic, often
referred to as a choke points.

A

Funnel Network Traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

generally a combination of a network
design feature and a proactive device such as a firewall.

A

DMZ

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

We divide it into multiple smaller networks, each
acting as its own small network called a subnet.

A

Network segmentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

When we send data over networks that are not secure or trusted, an eavesdropper can glean a large amount of information from
what we send

A

Intercepting data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Looks at the contents of each packet in the traffic individually and makes a GROSS DETERMINATION, based on the source and destination IP addresses, the port number and the protocol being used, of whatever the traffic will be allowed to pass.

A

Packet Filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Function on the same general principle as packet filtering firewalls, but they are able to keep track of the traffic at a granular level.

A

Stateful Packet Inspection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

are capable of analyzing the actual content of the traffic that is flowing
through them.

A

Deep Packet Inspection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

These servers provide security and performance features GENERALLY FOR A PARTICULAR APPLICATION, such as mail or Web browsing.

A

Proxy Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Types of Firewall

A

Packet Filtering
Stateful Packet Inspection
Deep Packet Inspection
Proxy Server
Dmz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Monitor the networks, hosts, or applications to which they are
connected for unauthorized activity.

A

Network Intrusion Detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

often referred to as a tunnel, is an encrypted connection between two points.

A

Virtual Private Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

one of the simplest way and easiest ways we can protect our data
is to use our ______

A

Secure Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

When we send data over networks that are not secure or trusted,
an eavesdropper can glean a large amount of information from
what we send

A

Intercepting data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Wireless networks freely broadcast our data for anyone with the appropriate
technology to hear.

A

Wireless network security

17
Q

, commonly used to detect wireless access points and can find them even when attempts have been made to make doing so difficult.