Security Technologies: VPNs & Firewalls & IDS 4.4 Flashcards

1
Q

Provides a real-time analysis or security alerts generated by network hardware and applications

gathers data and logs from all sorts or different systems

A

Security Information and Event Management (SIEM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Routes and encrypts only the traffic bound for the headquarters over the VPN, and sends the rest of that traffic to the regular internet

A

Split Tunnel VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Routes and encrypts all network requests through the VPN connection back to the headquarters

A

Full Tunnel VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Creates a secure, remote-access VPN tunnel using a web browser without requiring a software or hardware client

A

Clientless VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Provides cryptography and reliability using the upper layers of the OSI model, specifically Layers 5,6, and 7

A

Secure Socket Layer (SSL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Provides secure web browsing over HTTPS

A

Transport Layer Security (TLS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Older protocol. Lacks security features like an encryption by default and needs to be combined with an extra encryption layer for protection

A

Layer 2 Tunneling Protocol VPN (L2TP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Provides a tunneling protocol for the P2P protocol but also lacks native security and encryption features

A

Layer 2 Forwarding (L2F)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Older version of a VPN. Supports dial-up networks but also lacks native security features except when used with Microsoft Windows

A

Point-to-Point Tunneling Protocol (PPTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Provides Authentication and encryption of packets to create a secure encrypted communication path between two computers

A

IP Security (IPSec)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

is a master node. Sends and receives data from managed devices back to a centralized network management station

A

Simple Network Management Protocol (SNMP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The structure of the management data of a device subsystem using a hierarchical namespace containing object identifiers

A

Management Information Base (MIB)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Provides three security enhancements which added integrity, authentication, and confidentiality to the SNMP protocol

A

SNMPv3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Sends the client a string of random text called a challenge which is then encrypted using a password and sent back to the server

A

Challenge Handshake Authentication Protocol (CHAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Sends usernames and passwords in plain text for authentication

A

Password Authentication Protocol (PAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Syslog Severity Levels 0-7

A

0-Emergency
1-Alert
2-Critical
3-Error
4-Warning
5-Notice
6-Information
7-Debugging

17
Q

Uses a set of rules defining the types of traffic permitted or denied through the device

A

Firewall

18
Q

Permits or denies traffic based on packet header

A

Packet-Filtering Firewall

19
Q

Inspects traffic as part of a session and recognizes where the traffic originated

A

Stateful Firewall

20
Q

Third generation firewall that conducts deep packet inspection and packet filtering

A

NextGen Firewall (NGFW)

21
Q

Set of rules applied to router interfaces that permit or deny certain traffic

A

Access Control List (ACL)

22
Q

Connects to devices that should have restricted access from the outside zone (like web servers)

A

Demilitarized Zone (DMZ)

23
Q

Combines firewall, router, intrusion detection/prevention system, anti-malware, and other features into a single device

A

Unified Threat Management (UTM) Device

24
Q

Signature contains strings of bytes (a pattern) that triggers detection

A

Signature-based Detection

25
Q

Relies on a specific declaration of the security policy

A

Policy-based detection

26
Q

Watches traffic patterns to build a baseline

A

Statistical Anomaly-based detection

27
Q

Adminstrator defines the patterns/baseline

A

Non-statistical Anomaly-based detection

28
Q

A network device protects entire network. Can be used to prevent DDoS attack

A

Network-based (NIDS.NIPS)

29
Q

Software-based and installed on servers and clients. Can be used to prevent people from installing or running software. Prevents Malware attacks.

A

Host-based (HIDS/HIPS)