Network Security Flashcards
What do most firewalls use as the last rule?
Implicit deny rule
What type of cloud-based service is webmail?
Software as a Service (SaaS)
What type of attack can a flood guard help prevent?
SYN flood attack
What can a company use to distribute web-based requests to several web servers hosting the same content?
Load balancer
What are two common protocols used to secure FTP?
File Transfer Protocol Secure (FTPS) and Secure FTP (SFTP)
A network is using CAT 5 cable. What can prevent data loss?
Shielding
What protocol does SFTP use?
Secure FTP (SFTP) uses Secure Shell (SSH) over port 22.
Provides restarting and continuing interrupted transfers
Listing directories
Removing remote files
What is a wireless device that provides unauthorized access to a network?
Rogue access point
What is a wireless device that provides unauthorized access to a network and uses the same SSID as an authorized wireless access point?
Evil twin
What is needed to use WPA2 with an 802.1X server instead of using pre-shared keys?
Remote Authentication Dial-in User Service (RADIUS)
What should be used to prevent wireless users from accessing other wireless computers through a wireless access point?
Isolation mode
You want to reduce the success of war driving. What can you do to the WAP?
Reduce the power output of the WAP (or adjust the antenna placement)
What protocol provides the best security for a wireless network?
WPA2
What wireless security protocol has been hacked and should not be used?
WEP
What should be done with the SSID for security?
Change default name
What can you do with the SSID to hide a wireless network from casual users (but not informed attackers)?
Disable said broadcasting
What can be used to prevent specific wireless computers from accessing a wireless network?
MAC filtering
What protocol is used to monitor network devices?
Simple Network Management Protocol (SNMP)
An organization wants to allow 300 employees to remotely access the corporate network. What is a good choice?
Virtual private network (VPN) concentrator
What would an organization create to host Internet-based servers but protect servers on an internal network?
Demilitarized zone (DMZ)
What port would you block to prevent Telnet traffic?
Port 23
What port does TFTP use?
Trivial File Transfer Protocol (TFTP) uses port 69
Between UDP and TCP, what does FTP use?
File Transfer Protocol (FTP) uses TCP
Between UDP and TCP, what does TFTP use?
Trivial File Transfer Protocol (TFTP) uses UDP