Protecting the Organization Flashcards

Module 4 (20 cards)

1
Q

IPS

A

Intrusion prevention systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

uses a set of traffic signatures that match and block malicious traffic and attacks

A

IPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Let remote employees use a secure encrypted tunnel from their mobile computer and securely connect back to the organization’s network.

A

VPN (Virtual Private Network)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Uses signatures or behavioral analysis of applications to identify and block malicious code from being executed

A

Antimalware/Antivirus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Looks deeper into the network traffic itself and identify malicious behavior that has to be blocked

A

Firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

is installed in next generation Cisco routers, firewalls, IPS devices and web and email security appliances. It can also be installed as software in host computers.

A

Cisco’s Advanced Malware Protection (AMP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

a VPN system that lets remote workers use a secure encrypted tunnel from their mobile computer to securely connect back to the organization’s network. All Cisco security appliances are equipped with a VPN server and client technology, designed for secure encrypted tunneling.

A

Cisco’s AnyConnect Secure Mobility Client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

a next generation firewall that has all the capabilities of an ISR router, as well as advanced network management and analytics. It can help you to see what’s happening on the network so that you can detect attacks earlier.

A

Cisco’s Firepower 4100 Series

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

these routers have many capabilities, including traffic filtering, the ability to run an intrusion prevention system (IPS), encryption and VPN capabilities for secure encrypted tunneling.

A

Cisco Integrated Services Router (ISR) 4000

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

this firewall filters communications based on source and destination IP addresses.

A

Network layer firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

this firewall filters communications based on source and destination data ports, as well as connection states.

A

Transport layer firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

this firewall filters communications based on an application, program or service.

A

Application layer firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

this firewall filters communications based on the user, device, role, application type and threat profile.

A

Context aware layer firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

this firewall filters web content requests like URLs, domain names and media types.

A

Proxy server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

this firewall is placed in front of web servers, reverse proxy servers protect, hide, offload and distribute access to web servers.

A

Reversed proxy server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

this firewall hides or masquerades the private addresses of network hosts.

A

Network address translation (NAT) firewall

17
Q

this firewall filters ports and system service calls on a single computer operating system.

A

Host-based firewall

18
Q

a process of probing a computer, server or other network host for open ports.

A

Port Scanning

19
Q

IDS

A

Intrusion detection system

20
Q

security measures deployed on a network to detect and prevent malicious activities.