Shared Flashcard Set

Details

Network + Section 6
Modules 6.1 - 6.6
89
Computer Networking
Professional
04/20/2011

Additional Computer Networking Flashcards

 


 

Cards

Term
What is a software-based protection, that only protects the device it is on?
Definition
Host-Based Firewall
Term
What is the major limitation of host-based firewalls?
Definition
Difficult to manage large groups
Term
What type of device filters by port number at OSI Layer 4?
Definition
Network-based firewall
Term
What type of device can encrypt and decrypt traffic coming in and out of a network?
Definition
Network-based firewall
Term
What type of security device can also proxy traffic?
Definition
Network-based Firewall
Term
What are some advantages of Network-based firewalls?
Definition
Protects many devices at once, High speed
Term
What are some advantages of IDS/IPS?
Definition
Watches all traffic, stops bad traffic
Term
What device allows you to set up an encrypted tunnel from your laptop to your private network?
Definition
VPN concentrator
Term
What security device sits on a device and protects against attacks?
Definition
Host-based firewall
Term
What type of firewall does not keep track of the state of the flow or conversation?
Definition
Stateless Firewall
Term
What type of firewall keeps track of the state of information flow, and does not allow information from any conversation that does not have a current state?
Definition
Stateful Firewall
Term
What is the most basic level of firewall security?
Definition
Zone-based firewalls
Term
In a zone based firewalls, how are policies set?
Definition
Based on zones
Term
What is the type of firewall that understands applications, and allows you to set policies more easily?
Definition
Application layer firewall
Term
What type of firewall may open up multiple ports with one rule?
Definition
Application layer firewall
Term
What does signature identification allow your firewall to do?
Definition
Catch bad stuff coming into a network
Term
What should you ensure as it relates to firewall signatures?
Definition
That they're consistently updated
Term
What capability of a firewall allows us to block traffic based on URL?
Definition
Content Filtering
Term
What allows a firewall to look for viruses, spyware, vulnerabilities, etc.
Definition
Scanning Services
Term
What kind of firewall rule relies on TCP UDP port ranges to restrict or allow traffic?
Definition
Network Layer rules
Term
What do we call the practice of selectively preventing traffic from moving from one part of the network to another?
Definition
Filtering
Term
What does ACL stand for?
Definition
Access Control Lists
Term
What defines permissions for what a user can access?
Definition
Access Control List
Term
What allows or restricts access based on data link control addresses?
Definition
MAC address filtering
Term
What type of filtering allows or restricts access to the network based on network layer addresses?
Definition
IP filtering
Term
What does PPTP stand for?
Definition
Point to Point Tunneling Protocol
Term
What are the two ways to authenticate accross a PPTP tunnel?
Definition
MS-CHAP, and EAP-TLS
Term
What is usually used to encrypt accross a PPTP tunnel?
Definition
Microsoft Point to Point Encryption (MPEE)
Term
What does L2TP stand for?
Definition
Layer 2 Tunneling Protocol
Term
What port does L2TP use?
Definition
UDP/1701
Term
What do we use for encryption over L2TP?
Definition
IPSec
Term
What is the modern version of PPTP?
Definition
L2TP
Term
What does IPSec do?
Definition
Authenticates and encrypts
Term
What does IPSec stand for?
Definition
Internet Protocol Security
Term
What does IPSec use for security?
Definition
Internet Key Exchange
Term
How does IPSec encrypt?
Definition
Encapsulating Security Payload (ESP)
Term
What does IPSec use for authentication?
Definition
An authentication header
Term
What is the simplest tunneling protocol?
Definition
SSL VPN
Term
Which type of tunneling protocol allows for very light client software?
Definition
SSL VPN
Term
What does RAS stand for?
Definition
Remote Access Service
Term
What does RAS allow us to do?
Definition
Access a device or network from a remote location
Term
Who created RAS?
Definition
Microsoft
Term
What does PPP stand for?
Definition
Point to Point Protocol
Term
What OSI layer does PPP operate on?
Definition
Layer 2/Data Link
Term
What does RDP stand for?
Definition
Remote Desktop Protocol
Term
What port does RDP use?
Definition
TCP/3389
Term
What can you connect to with RDP?
Definition
A desktop or application
Term
What does ICA stand for?
Definition
Independent Computing Architecture
Term
What is a common open source way to remotely access a desktop?
Definition
Virtual Network Computing (VNC)
Term
What are the three most common ways to authenticate users?
Definition
Username/password, Token generators, and Biometrics
Term
What do we call a one way cryptographic function?
Definition
hash
Term
What are the two hash digest algorhythms?
Definition
MD5 and SHA
Term
What does CHAP stand for?
Definition
Challenge and Handshake Authentication Protocol
Term
What are the three components of CHAP and MS-CHAP?
Definition
Challenge, Hash Response, Check for a match
Term
What does EAP stand for?
Definition
Extensible Authentication Protocol
Term
What is an extremely flexible framework for authentication?
Definition
EAP
Term
What is a type of cryptography in which a build two keys together, and give one to the publiuc for encryption and retain a private key for decryption?
Definition
Public Key
Term
What do we call an algorhythm in which the key used to decrypt is different than the key used to encrypt?
Definition
Asymmetric key algorhythm
Term
What does PKI stand for?
Definition
Public Key Infrastructure
Term
What do we call the set of public-key policies and procedures?
Definition
PKI
Term
What is a way to create, manage, store, distribute, and revoke keys?
Definition
PKI
Term
What is a common open network authentication protocol that takes advantage of public-key cryptography?
Definition
Kerberos
Term
What allows you to access things you have rights and permissions to access in kerberos?
Definition
tickets
Term
What is a challenge to kerberos use in small environments?
Definition
It requires quite a bit of infrastructure
Term
What does AAA stand for?
Definition
Authentication, Authorization, and Accounting
Term
What type of protocol is RADIUS?
Definition
AAA
Term
What is an authentication protocol created by Cisco for access to infrastructure devices?
Definition
TACACS+
Term
What is a common authentication for access to the network that is often used on a wireless network?
Definition
802.1x
Term
What protocol does 802.1x use?
Definition
EAP
Term
What does 802.1x generally authenticate against?
Definition
RADIUS or TACACS+ server
Term
Why is physical security important?
Definition
Most servers can easily be comprimised if you can touch them
Term
What do we call protocols where traffic is sent in the clear?
Definition
Unsecure protocols
Term
Is FTP secure or unsecure?
Definition
Unsecure
Term
What does RSH allow us to do?
Definition
Run commands accross the network
Term
What is the secure version of Telnet?
Definition
SSH
Term
What is a secure version of HTTP?
Definition
HTTPS
Term
What is the version of SNMP that is encrypted?
Definition
v.3
Term
What is the secure way to do remote file management?
Definition
sftp
Term
What is a secure way to copy files?
Definition
scp
Term
What security component can address unauthorized visitors in secure areas of a building?
Definition
VPN
Term
What do we call something that happens to a device that prevents it from providing normal services?
Definition
Denial Of Service
Term
What type of denial of service consisted of pings sent to a broadcast address, and the packets were duplicated to everyone on the network?
Definition
Smurf Attacks
Term
What is a piece of bad code that infects files and duplicate by copying themselves with other documents?
Definition
A Virus
Term
What type of malware doesn't need any other files and programs in order to infect other devices?
Definition
Worm
Term
What is a catch all term for viruses, worms, trojans, spyware, adware, etc.?
Definition
malware
Term
What do we call electronic eavesdropping?
Definition
Man in the middle
Term
What is an inexpensive way to compromise a network by circumventing all security measures?
Definition
Rogue access points
Term
What is an attack on the network that involves manipulating people, and cannot be detected electronically?
Definition
Social Engineering
Term
What is an electronic version of social engineering?
Definition
Phishing
Supporting users have an ad free experience!