Term
What is a software-based protection, that only protects the device it is on? |
|
Definition
|
|
Term
What is the major limitation of host-based firewalls? |
|
Definition
Difficult to manage large groups |
|
|
Term
What type of device filters by port number at OSI Layer 4? |
|
Definition
|
|
Term
What type of device can encrypt and decrypt traffic coming in and out of a network? |
|
Definition
|
|
Term
What type of security device can also proxy traffic? |
|
Definition
|
|
Term
What are some advantages of Network-based firewalls? |
|
Definition
Protects many devices at once, High speed |
|
|
Term
What are some advantages of IDS/IPS? |
|
Definition
Watches all traffic, stops bad traffic |
|
|
Term
What device allows you to set up an encrypted tunnel from your laptop to your private network? |
|
Definition
|
|
Term
What security device sits on a device and protects against attacks? |
|
Definition
|
|
Term
What type of firewall does not keep track of the state of the flow or conversation? |
|
Definition
|
|
Term
What type of firewall keeps track of the state of information flow, and does not allow information from any conversation that does not have a current state? |
|
Definition
|
|
Term
What is the most basic level of firewall security? |
|
Definition
|
|
Term
In a zone based firewalls, how are policies set? |
|
Definition
|
|
Term
What is the type of firewall that understands applications, and allows you to set policies more easily? |
|
Definition
Application layer firewall |
|
|
Term
What type of firewall may open up multiple ports with one rule? |
|
Definition
Application layer firewall |
|
|
Term
What does signature identification allow your firewall to do? |
|
Definition
Catch bad stuff coming into a network |
|
|
Term
What should you ensure as it relates to firewall signatures? |
|
Definition
That they're consistently updated |
|
|
Term
What capability of a firewall allows us to block traffic based on URL? |
|
Definition
|
|
Term
What allows a firewall to look for viruses, spyware, vulnerabilities, etc. |
|
Definition
|
|
Term
What kind of firewall rule relies on TCP UDP port ranges to restrict or allow traffic? |
|
Definition
|
|
Term
What do we call the practice of selectively preventing traffic from moving from one part of the network to another? |
|
Definition
|
|
Term
|
Definition
|
|
Term
What defines permissions for what a user can access? |
|
Definition
|
|
Term
What allows or restricts access based on data link control addresses? |
|
Definition
|
|
Term
What type of filtering allows or restricts access to the network based on network layer addresses? |
|
Definition
|
|
Term
What does PPTP stand for? |
|
Definition
Point to Point Tunneling Protocol |
|
|
Term
What are the two ways to authenticate accross a PPTP tunnel? |
|
Definition
|
|
Term
What is usually used to encrypt accross a PPTP tunnel? |
|
Definition
Microsoft Point to Point Encryption (MPEE) |
|
|
Term
What does L2TP stand for? |
|
Definition
Layer 2 Tunneling Protocol |
|
|
Term
|
Definition
|
|
Term
What do we use for encryption over L2TP? |
|
Definition
|
|
Term
What is the modern version of PPTP? |
|
Definition
|
|
Term
|
Definition
Authenticates and encrypts |
|
|
Term
What does IPSec stand for? |
|
Definition
Internet Protocol Security |
|
|
Term
What does IPSec use for security? |
|
Definition
|
|
Term
|
Definition
Encapsulating Security Payload (ESP) |
|
|
Term
What does IPSec use for authentication? |
|
Definition
|
|
Term
What is the simplest tunneling protocol? |
|
Definition
|
|
Term
Which type of tunneling protocol allows for very light client software? |
|
Definition
|
|
Term
|
Definition
|
|
Term
What does RAS allow us to do? |
|
Definition
Access a device or network from a remote location |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
What OSI layer does PPP operate on? |
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
What can you connect to with RDP? |
|
Definition
|
|
Term
|
Definition
Independent Computing Architecture |
|
|
Term
What is a common open source way to remotely access a desktop? |
|
Definition
Virtual Network Computing (VNC) |
|
|
Term
What are the three most common ways to authenticate users? |
|
Definition
Username/password, Token generators, and Biometrics |
|
|
Term
What do we call a one way cryptographic function? |
|
Definition
|
|
Term
What are the two hash digest algorhythms? |
|
Definition
|
|
Term
What does CHAP stand for? |
|
Definition
Challenge and Handshake Authentication Protocol |
|
|
Term
What are the three components of CHAP and MS-CHAP? |
|
Definition
Challenge, Hash Response, Check for a match |
|
|
Term
|
Definition
Extensible Authentication Protocol |
|
|
Term
What is an extremely flexible framework for authentication? |
|
Definition
|
|
Term
What is a type of cryptography in which a build two keys together, and give one to the publiuc for encryption and retain a private key for decryption? |
|
Definition
|
|
Term
What do we call an algorhythm in which the key used to decrypt is different than the key used to encrypt? |
|
Definition
Asymmetric key algorhythm |
|
|
Term
|
Definition
Public Key Infrastructure |
|
|
Term
What do we call the set of public-key policies and procedures? |
|
Definition
|
|
Term
What is a way to create, manage, store, distribute, and revoke keys? |
|
Definition
|
|
Term
What is a common open network authentication protocol that takes advantage of public-key cryptography? |
|
Definition
|
|
Term
What allows you to access things you have rights and permissions to access in kerberos? |
|
Definition
|
|
Term
What is a challenge to kerberos use in small environments? |
|
Definition
It requires quite a bit of infrastructure |
|
|
Term
|
Definition
Authentication, Authorization, and Accounting |
|
|
Term
What type of protocol is RADIUS? |
|
Definition
|
|
Term
What is an authentication protocol created by Cisco for access to infrastructure devices? |
|
Definition
|
|
Term
What is a common authentication for access to the network that is often used on a wireless network? |
|
Definition
|
|
Term
What protocol does 802.1x use? |
|
Definition
|
|
Term
What does 802.1x generally authenticate against? |
|
Definition
|
|
Term
Why is physical security important? |
|
Definition
Most servers can easily be comprimised if you can touch them |
|
|
Term
What do we call protocols where traffic is sent in the clear? |
|
Definition
|
|
Term
Is FTP secure or unsecure? |
|
Definition
|
|
Term
What does RSH allow us to do? |
|
Definition
Run commands accross the network |
|
|
Term
What is the secure version of Telnet? |
|
Definition
|
|
Term
What is a secure version of HTTP? |
|
Definition
|
|
Term
What is the version of SNMP that is encrypted? |
|
Definition
|
|
Term
What is the secure way to do remote file management? |
|
Definition
|
|
Term
What is a secure way to copy files? |
|
Definition
|
|
Term
What security component can address unauthorized visitors in secure areas of a building? |
|
Definition
|
|
Term
What do we call something that happens to a device that prevents it from providing normal services? |
|
Definition
|
|
Term
What type of denial of service consisted of pings sent to a broadcast address, and the packets were duplicated to everyone on the network? |
|
Definition
|
|
Term
What is a piece of bad code that infects files and duplicate by copying themselves with other documents? |
|
Definition
|
|
Term
What type of malware doesn't need any other files and programs in order to infect other devices? |
|
Definition
|
|
Term
What is a catch all term for viruses, worms, trojans, spyware, adware, etc.? |
|
Definition
|
|
Term
What do we call electronic eavesdropping? |
|
Definition
|
|
Term
What is an inexpensive way to compromise a network by circumventing all security measures? |
|
Definition
|
|
Term
What is an attack on the network that involves manipulating people, and cannot be detected electronically? |
|
Definition
|
|
Term
What is an electronic version of social engineering? |
|
Definition
|
|