Network Security 4.1 Flashcards

1
Q

A perimeter network that protects an organization’s internal local area network from untrusted traffic

A

DMZ

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Subnet in the network architecture that uses a single firewall with three interfaces to connect three dissimilar networks

A

Screen Subnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Prevents frauds and abuse by distributing various tasks and approval authorities across a number of different users

A

Separation of Duties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Two people each have half of the knowledge of how to do something

A

Split Knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Attracts and traps potential attackers to counteract any attempts at unauthorized access to a network. Used a form of research to learn the tools involved in network attacks

A

Honeypot/Honeynet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Using the lowest level of permissions of privileges needed in order to complete a job function or admin task

A

Least Privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An access control model that is controlled by the system but focuses on a set of permissions versus an individual’s permissions

A

Role-Based Access (RBAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An access control method where access is determined by the owner of the resource

A

Directionary Access Control (DAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

An access control policy where the computer system gets to decide who gets access to what objects. Used in the government for security clearance.

A

Mandatory Access Control (MAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A security framework that requires users to be authenticated and authorized before being granted access to applications and data

A

Zero-Trust

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Authenticates or proves an identity using more than one method

A

Multifactor Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Tries every possible combination until they figure out the password

A

Brute Force Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Combination of dictionary and brute force attacks

A

Hybrid Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The process of determining whether someone or something is who or what it claims itself to be

A

Authentication Methods

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A database used to centralize information about your clients and your objects on your network

A

Lightweight Directory Access Protocol (LDAP) – Port 389

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Organizes and manages everything on the network, including clients, servers, devices and users

A

Active Directory

17
Q

validates usernames and password combination against an LDAP server as a form of authentication

A

Lightweight Directory Access Protocol (LDAP) – Port 389

18
Q

Focused on authentication and authorization within a Windows domain environment

19
Q

used to give a default user profile for each of their users and rank that profile to all different resources users will have access to. Can use strong password or MFA for authentication

A

Single Sign-On

20
Q

uses port 88

21
Q

Provides centralized administration of dial up, VPN, and wireless network authentication

A

Remote Authentication Dial-In User Service (RADIUS) - UDP

22
Q

Operates on Layer 7 - TACACAS or RADIUS?

A

Remote Authentication Dial-In User Service (RADIUS) - UDP

23
Q

Used to perform the role of an Authenticator in an 802.1x network

A

Terminal Access Controller Access Control System Plus (TACACS+) - TCP

24
Q

A standardized framework that’s used for port-based authentication on both wired and wireless networks

25
The device requesting access to the network
Supplicant
26
The device through which the supplicant is requesting to access the network (ex: Switch, Access point, VPN concentrator)
Authenticator
27
Centralized device that performs the Authorization (RADIUS or TACACS+ server)
Authentication Server
28
Allows for numerous different mechanisms of authentication
Extensible Authentication Protocol (EAP)
29
Utilizes simple passwords and the challenge handshake authentication process to provide remote access authentication
EAP – MD5
30
Uses public key infrastructure with a digital certificate being installed on both the client and the server
EAP-TLS
31
Requires a digital certificate on the server and a password on the client for its authentication
EAP-TTLS
32
Uses a protected access credential to establish mutual authentication between devices
EAP Flexible Authentication via Secure Tunneling (EAP-FAST)
33
Uses server certificates and Microsoft's Active Directory databases to authenticate a client's password
Protected EAP (PEAP)