Module 13 Flashcards

1
Q

Where do many attacks originate from?

A

Inside the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Traditional host-based security measures

A

Antivirus/Antimalware Software
Host-based IPS
Host-based firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Antivirus/Antimalware Software

A

Installed on a host to detect and mitigate viruses and malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Host-based IPS

A

Installed on the local host to monitor and report on the system configuration and application activity, provide log analysis, event correlation, integrity checking, policy enforcement, rootkit detection, and alerting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Host-based firewall

A

Installed on a host that restricts incoming and outgoing connections to those initiated by that host only

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Spam filtering

A

Prevents spam emails from reaching endpoints

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Blocklisting

A

Prevents endpoints from connecting to websites with bad reputations by immediately blocking connections based on the latest reputation intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Data Loss Prevention (DLP)

A

Prevents sensitive information from being lost or stolen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Advanced Malware Protection (AMP)

A

Provides endpoint protection from viruses and malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Email Security Appliance (ESA)

A

Provides filtering of SPAM and potentially malicious emails before they reach the endpoint

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Web Security Appliance (WSA)

A

Provides filtering and blocking of websites to prevent hosts from reaching dangerous locations on the web

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does Cisco WSA provide?

A

Control over how users access the internet and can enforce acceptable use policies, control access to specific sites and services, and scan for malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Network Admission Control (NAC)

A

Permits only authorized and compliant systems to connect to the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is susceptible to data theft?

A

Endpoints

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

NAC system capabilities

A

Profiling and visibility
Guest network access
Security posture checking
Incident response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Profiling and visibility

A

Recognizes and profiles users and their devices before malicious code can cause damage

17
Q

Guest network access

A

Manages guests through a customizable, self-service portal that includes guest registration, guest authentication, guest sponsoring, and a guest management portal

18
Q

Security posture checking

A

Evaluates security-policy compliance by user type, device type, and operating system

19
Q

Incident response

A

Mitigates network threats by enforcing security policies that block, isolate, and repair noncompliant machines without administrator attention

20
Q

Cisco Identity Services Engine (ISE) combines?

A

AAA and network device profiling into a single system

21
Q

How do network access devices function as the enforcement layer?

A

They force the clients to query for authentication and authorization. They can query other devices, such as an antivirus server, and reply to the network enforcers

22
Q

What does IEEE 802.1X standard define?

A

A port-based access control and authentication protocol that restricts unauthorized workstations from connecting to a LAN through publicly accessible switch ports. It authenticates each workstation before making available any services offered by the switch or LAN

23
Q

Supplicant (Client)

A

Workstation that requests access to LAN and switch services and then responds to requests from the switch. Workstation has to run 802.1X-compliant client software

24
Q

Authenticator (Switch)

A

Controls physical access to the network based on the authentication status of the client

25
Q

Why does the switch use a RADIUS software agent?

A

It is responsible for encapsulating and de-encapsulating the Extensible Authentication Protocol (EAP) frames and interacting with the authentication server

26
Q

Authentication server

A

Performs the actual authentication of the client. It validates the identity of the client and notifies the switch whether the client is authorized to access the LAN and switch services