Network Risk Management Flashcards

(35 cards)

1
Q

the list of statements on a router to permit/deny traffic

A

ACL (access control list)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

a myriad of small, simple requests that all result in giant responses

A

amplification attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

the filter takes applications into consideration

A

application aware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

gives the firewall application awareness

A

Application Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

software security flaws

A

backdoor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

a group of computers in coordinated DDoS attacks without knowledge

A

botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

a document to make employees aware that their computer and equipment use will be monitored

A

consent to monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A system becomes inundated with service requests and ceases to respond

A

Denial of Service attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

software on a device that allows it to access the network, subsequently uninstalls

A

dissolvable agent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

multiple hosts inundate a target with traffic

A

Distributed attakc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

a DoS attack bounced off of uninfected computers (reflectors) before arriving at the target.

A

Distributed reflector attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A switch security feature to monitor ARP messages and detect phony ones

A

Dynamic ARP inspection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Implementation of TEMPEST to protect against RF emanation

A

emission security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

causing the target’s computer screen to fill with garbage

A

flashing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

An FTP client specifies a different host’s IP address and port number for data destination.

A

FTP bounce

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

scanning for malware-like behavior

A

heuristic scanning

17
Q

runs on a single computer, alerts about intrusions

A

HIDS (host-based intrusion detection system)

18
Q

runs on a single computer, intercepts intrusions

A

HIPS (host-based intrusion prevention system)

19
Q

dedicated service to monitor traffic and alert

A

IDS (intrusion detection system)

20
Q

dedicated service to prevent malicious traffic

A

IPS (intrusion prevention system)

21
Q

a virus in a macro that executes when a program is in use

22
Q

a person captures or redirects secure data while in transit

A

man-in-the-middle attack

23
Q

combines known scanning techniques and exploits to explore potential exploits

24
Q

employs network policies to determine a device’s access permissions.

A

NAC (network access control)

25
some parts of the network have been physically separated in order to protect resources
network segementation
26
A DoS attack rendering a device irreparable
permanent DoS attack
27
a port on a switch that sends a copy of all traffic to a second port
port mirroring
28
the assessment of an organization's security vulnerabilities
posture assessment
29
a section of the network that a device joins when its configurations do not meet compliance requirements
quarantine network
30
a host that provides services to internet clients from servers on its own network
reverse proxy
31
network hosts are flooded with broadcast messages
smurf attack
32
a firewall that inspects packets to determine if they originate from an active connection
stateful firewall
33
a firewall that inspects packets on a stand-alone basis
stateless firewall
34
An NSA standard to protect against RF emanations
TEMPEST
35
a software vulnerability for a program that has not yet become public.
zero-day attack