Module 7: Securing the Local Area Network and Cryptographic Systems Flashcards
It is an endpoint security that is employed to protect critical computer systems containing crucial data against viruses and other Internet malware.
host-based intrusion prevention system (HIPS)
three host-based protections
- host-based intrusion prevention system (HIPS)
- host-based firewall
- antivirus/antimalware software
A granular way to protect individual hosts from viruses and malware, and to control the spread of these harmful infections throughout the network.
host-based firewall
The technical architecture that allows organizations to connect anyone, anywhere, anytime, and on any device – securely, reliably, and seamlessly.
Borderless Network
It is the foundation for the Network Infrastructure, providing optimization, scale, and security to collaboration and virtualization.
Borderless Network
What are the different host-based protection/endpoint in a borderless network?
- antivirus/antimalware
- spam filtering
- Uniform Resource Locator (URL) filtering
- blacklisting
- data loss prevention
What are the different modern endpoint security solutions?
- Advanced Malware Protection (AMP)
- Enterprise Security Architecture (ESA)
- Web Security Appliance (WSA)
- Network access control (NAC)
A modern endpoint security solution where its main focus is be to align information security controls and processes with business strategy, goals and objectives.
enterprise security architecture
A modern endpoint security solution which is the practice of applying a comprehensive and rigorous method for describing a current and/or future structure and behavior for an organization’s security processes, information security systems, personnel, and organizational sub-units so that they align with the organization’s core goals and strategic direction.
enterprise security architecture
A modern endpoint security solution which is the methodology and process used to develop a risk-driven security framework and business controls.
enterprise security architecture
A modern endpoint security solution that aims to do exactly what the name implies—control access to a network with policies, including pre-admission endpoint security policy checks and post-admission controls over where users and devices can go on a network and what they can do.
network access control
A modern endpoint security solution which safeguards businesses through broad threat intelligence, multiple layers of malware defense, and vital data loss prevention (DLP) capabilities across the attack continuum.
web security appliance
A modern endpoint security solution which is an all-in-one web gateway that brings you broad protection, extensive controls, and investment value.
Web Security Appliance
A modern endpoint security solution that might integrate the automatic remediation process (fixing non-compliant nodes before allowing access) into the network systems, allowing the network infrastructure such as routers, switches and firewalls to work together with back office servers and end user computing equipment to ensure the information system is operating securely before interoperability is allowed.
Network access control
A modern endpoint security solution that is designed to prevent, detect, and help remove threats in an efficient manner from computer systems.
Advanced Malware Protection
A modern endpoint security solution that is a computer networking solution that uses a set of protocols to define and implement a policy that describes how to secure access to network nodes by devices when they initially attempt to access the network
Network access control
What are the 3 Advance Malware Protection offered by Cisco?
- AMP for endpoints
- AMP for Networks
- AMP for Content Security
A Cisco AMP that integrates with Cisco AMP for Networks to deliver comprehensive protection across extended networks and endpoints.
AMP for endpoints
A Cisco AMP that provides a network-based solution and is integrated into dedicated Cisco ASA Firewall and Cisco FirePOWER network security appliances.
AMP for Networks
A Cisco AMP that is an integrated feature in Cisco Cloud Web Security or Cisco Web and Email Security Appliances to protect against email and web-based advanced malware attacks.
AMP for Content Security
What are the features and benefits of Cisco Email Security solutions?
- Global threat intelligence
- Spam blocking
- Advanced malware protection
- Outbound message control
What are the switch attack categories?
- Spanning Tree Protocol (STP) Attack
- Address Spoofing Attack
- Address Resolution Protocol (ARP) Attack
- Dynamic Host Configuration Protocol (DHCP) Attack
- virtual local area network (VLAN) Attack
- Content Addressable Memory (CAM) Table Attack
An enabling port security command used to learn connected MAC address dynamically
switchport port-security mac-address sticky
An enabling port security command used to manually configure MAC addresses
switchport port-security mac-address