Network Security 4.1 Flashcards

1
Q

A perimeter network that protects an organization’s internal local area network from untrusted traffic

A

DMZ

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Subnet in the network architecture that uses a single firewall with three interfaces to connect three dissimilar networks

A

Screen Subnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Prevents frauds and abuse by distributing various tasks and approval authorities across a number of different users

A

Separation of Duties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Two people each have half of the knowledge of how to do something

A

Split Knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Attracts and traps potential attackers to counteract any attempts at unauthorized access to a network. Used a form of research to learn the tools involved in network attacks

A

Honeypot/Honeynet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Using the lowest level of permissions of privileges needed in order to complete a job function or admin task

A

Least Privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An access control model that is controlled by the system but focuses on a set of permissions versus an individual’s permissions

A

Role-Based Access (RBAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An access control method where access is determined by the owner of the resource

A

Directionary Access Control (DAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

An access control policy where the computer system gets to decide who gets access to what objects. Used in the government for security clearance.

A

Mandatory Access Control (MAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A security framework that requires users to be authenticated and authorized before being granted access to applications and data

A

Zero-Trust

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Authenticates or proves an identity using more than one method

A

Multifactor Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Tries every possible combination until they figure out the password

A

Brute Force Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Combination of dictionary and brute force attacks

A

Hybrid Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The process of determining whether someone or something is who or what it claims itself to be

A

Authentication Methods

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A database used to centralize information about your clients and your objects on your network

A

Lightweight Directory Access Protocol (LDAP) – Port 389

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Organizes and manages everything on the network, including clients, servers, devices and users

A

Active Directory

17
Q

validates usernames and password combination against an LDAP server as a form of authentication

A

Lightweight Directory Access Protocol (LDAP) – Port 389

18
Q

Focused on authentication and authorization within a Windows domain environment

A

Kerberos

19
Q

used to give a default user profile for each of their users and rank that profile to all different resources users will have access to. Can use strong password or MFA for authentication

A

Single Sign-On

20
Q

uses port 88

A

Kerberos

21
Q

Provides centralized administration of dial up, VPN, and wireless network authentication

A

Remote Authentication Dial-In User Service (RADIUS) - UDP

22
Q

Operates on Layer 7 - TACACAS or RADIUS?

A

Remote Authentication Dial-In User Service (RADIUS) - UDP

23
Q

Used to perform the role of an Authenticator in an 802.1x network

A

Terminal Access Controller Access Control System Plus (TACACS+) - TCP

24
Q

A standardized framework that’s used for port-based authentication on both wired and wireless networks

A

802.1x

25
Q

The device requesting access to the network

A

Supplicant

26
Q

The device through which the supplicant is requesting to access the network (ex: Switch, Access point, VPN concentrator)

A

Authenticator

27
Q

Centralized device that performs the Authorization (RADIUS or TACACS+ server)

A

Authentication Server

28
Q

Allows for numerous different mechanisms of authentication

A

Extensible Authentication Protocol (EAP)

29
Q

Utilizes simple passwords and the challenge handshake authentication process to provide remote access authentication

A

EAP – MD5

30
Q

Uses public key infrastructure with a digital certificate being installed on both the client and the server

A

EAP-TLS

31
Q

Requires a digital certificate on the server and a password on the client for its authentication

A

EAP-TTLS

32
Q

Uses a protected access credential to establish mutual authentication between devices

A

EAP Flexible Authentication via Secure Tunneling (EAP-FAST)

33
Q

Uses server certificates and Microsoft’s Active Directory databases to authenticate a client’s password

A

Protected EAP (PEAP)