Network Security Operations Flashcards
(34 cards)
Which type of firewall initiates a new connection on behalf of the client and presents its own IP to the server when a client initiates a connection to a server?
Circuit level
Which feature of a firewall allows an organization to use private non-routable networks while enabling communication to the internet?
Port Address Translation (PAT)
What is the meaning of “state” when referring to stateful inspection in firewalls?
It refers to the connection state of a conversation between two computers.
What can a user install to detect malicious software?
Antivirus
Which feature of a network intrusion prevention system (NIPS) uses a lists of known bad IP addresses to protect the network?
Reputation-based prevention
A company provides access to employees’ tax and personal information via a public-facing web portal.
What should the company implement to encrypt employees’ web access to this information?
Transport layer security (TLS)
Which attack tricks a client into mapping an IP address to a spoofed MAC address?
ARP spoofing
Which type of port has access to all VLANs by default in a traditional layer 2 switch?
Trunk
Which cloud feature is used to prevent data loss and provide for data retrieval in the event of a disaster?
Data backups and archives
Which cloud-hosting model provides exclusive cloud access for a single company?
Private
What should a cloud provider use to secure data in flight?
Private key encryption
Which type of wireless security protocol is the most secure?
WPA2 + AES
Which statement is true when comparing AES encryption to Triple DES (3DES)?
AES requires less CPU utilization and uses a larger block size than 3DES.
What is the best defense against fake access attacks?
Never use unsecured Wi-Fi hotspots.
Which type of firewall technology reads and analyzes the actual content of a message before forwarding to its destination?
Proxy servers
An organization’s IT department is concerned that malicious insiders may be using elevated access rights.
Which security control can be used to draw attacks away from critical systems?
Honeypots
Which network device is usually placed in-line between a trusted network and an untrusted network?
Firewall
What is end-to-end encryption?
Data is encrypted on the sender’s system and only the recipient is able to decrypt it.
Which phrase describes unencrypted data?
In the clear
An adminstrator fails to configure protection for usernames and passwords transmitted across the network.
Which component of the AAA model is weakened?
Authentication
A user is mistakenly granted access to customer accounts not required for his duties.
Which component of the AAA model is violated?
Authorization
What device creates an array of MAC addresses and functions on the Data Link layer?
Switch
What device connects 2 or more networks, but does not analyze the information? On Layer 2.
Bridge
What device takes packets from the router and sends it to devices on network?
Hub