Deck 21: Network Endpoint Security

ملء الشاشة (f)
exit full mode
سؤال
Intrusion detection is the process of collecting information about
events occurring in a computer system or network and analyzing them for signs of intrusions.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
One limitation of a firewall is that an improperly secured wireless
LAN may be accessed from outside the organization.
سؤال
the primary benefit of a host-based IDS is that it can detect both
external and internal intrusions.
سؤال
Packet filter firewalls are susceptible to security breaches caused
by improper configurations.
سؤال
the __________ defines the transport protocol.

A)interface
B)IP protocol field
C)source IP address
D)destination IP address
سؤال
typically, a _________ is inserted between the premises network and the Internet to establish a controlled link and to erect an outer security wall or perimeter.

A)WAP
B)firewall
C)reflector
D)blocker
سؤال
A __________ provides a location for monitoring security-related events.

A)firewall
B)choke point
C)LAN
D)secured operating system
سؤال
the internal firewall provides a measure of access control and
protection for the DMZ systems consistent with their need for external connectivity.
سؤال
the firewall provides an additional layer of defense, insulating
internal systems from external networks or other parts of the internal network.
سؤال
__________ determines the direction in which particular service requests may be initiated and allowed to flow through the firewall.

A)Behavior control
B)Service control
C)Direction control
D)User control
سؤال
Analyzers are responsible for collecting dat
A.
سؤال
A circuit-level gateway permits an end-to-end tCP connection.
سؤال
the user control feature is typically applied to users outside the
firewall perimeter.
سؤال
Multiple internal firewalls can be used to protect portions of the
internal network from each other.
سؤال
__________ controls how particular services are used.

A)User control
B)Direction control
C)Service control
D)Behavior control
سؤال
A firewall may filter traffic on the basis of IP address, protocol, or
port number.
سؤال
Packet filter gateways tend to be more secure than application-
level gateways.
سؤال
A firewall may not act as a packet filter.
سؤال
the first step in a DDoS attack is for the attacker to infect a
number of machines with zombie software that will ultimately be
used to carry out the attack.
سؤال
A stateful packet inspection firewall reviews the same packet
information as a packet filtering firewall, but also records information about tCP connections.
سؤال
Between internal and external firewalls are one or more networked devices in a region referred to as a __________ network.

A)demilitarized zone
B)war zone
C)safe zone
D)protected zone
سؤال
the countermeasure for __________ is to discard packets with an inside source address if the packet arrives on an external interface.
سؤال
there are four techniques that firewalls use to control access and enforce the site's security policy: service control, direction control, user control, and __________ .
سؤال
__________ can more readily see the intended outcome of an attempted attack because they can directly access and monitor the data files and system processes usually targeted by attacks.

A)Host-based IDSs
B)External firewalls
C)User interfaces
D)Sensors
سؤال
A(n) __________ is placed at the edge of a local or enterprise network, just inside the boundary router that connects to the Internet or some wide area network.
سؤال
A(n) __________ is hardware or software products that gather and analyze information from various areas within a computer or a network for the purpose of finding, and providing real-time or near-real-time warning of, attempts to access system resources in an unauthorized manner.
سؤال
An application-level gateway, also called a(n) __________ , acts as a relay of application-level traffic.

A)application proxy
B)relay proxy
C)source proxy
D)program proxy
سؤال
Systems that are externally accessible but need some protections are usually located on _________ networks.

A)IDS
B)DMZ
C)DMARC
D)ISP
سؤال
A __________ monitors network traffic for particular network segments or devices and analyzes network, transport, and application protocols to identify suspicious activity.
سؤال
A __________ is a computer program that can copy itself and infect a computer without permission or knowledge of the user.

A)worm
B)virus
C)rootkit
D)trojan horse
سؤال
An __________ is violations of security policy, usually characterized as attempts to affect the confidentiality, integrity, or availability of a computer or network.

A)anomaly
B)IDS
C)intrusion
D)analyzer
سؤال
A __________ is an undocumented way of gaining access to a computer system.

A)backdoor
B)rootkit
C)bot
D)virus
سؤال
An IDS comprises three logical components: sensors, __________ , and user interface.
سؤال
A __________ attack can be defeated by enforcing a rule that the first fragment of a packet must contain a predefined minimum amount of the transport header.
سؤال
A typical use of __________ is a situation in which the system administrator trusts the internal users.

A)DMZ networks
B)firewalls
C)circuit-level gateways
D)IDSs
سؤال
Data collection, correlation, alerting, and reporting/compliance are all key elements of ___________ .

A)incident management
B)reflector DDoS
C)direct DDoS
D)malware
سؤال
the __________ to an IDS enables a user to view output from the system or
control the behavior of the system.
سؤال
A __________ firewall applies a set of rules to each incoming and outgoing IP packet and then forwards or discards the packet.
سؤال
__________ control determines the types of Internet services that can be accessed, inbound or outbound.
سؤال
A scanning strategy that uses information contained on an infected victim machine to find more hosts to scan is the __________ method.

A)random
B)hit list
C)topological
D)local subnet
سؤال
__________ is the identification, collection, examination, and analysis of data while preserving the integrity of the information and maintaining a strict chain of custody for the dat
A.
سؤال
there are two general approaches to intrusion detection: Misuse detection
and ___________ .
سؤال
A __________ attack attempts to consume the target's resources so that it
cannot provide service.
سؤال
Information security ___________ consists of processes for detecting,
reporting, assessing, responding to, dealing with, and learning from
information security incidents.
سؤال
Malicious software, commonly called __________ , is perhaps the most
significant security threat to organizations.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/45
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 21: Network Endpoint Security
1
Intrusion detection is the process of collecting information about
events occurring in a computer system or network and analyzing them for signs of intrusions.
True
2
One limitation of a firewall is that an improperly secured wireless
LAN may be accessed from outside the organization.
True
3
the primary benefit of a host-based IDS is that it can detect both
external and internal intrusions.
True
4
Packet filter firewalls are susceptible to security breaches caused
by improper configurations.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
5
the __________ defines the transport protocol.

A)interface
B)IP protocol field
C)source IP address
D)destination IP address
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
6
typically, a _________ is inserted between the premises network and the Internet to establish a controlled link and to erect an outer security wall or perimeter.

A)WAP
B)firewall
C)reflector
D)blocker
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
7
A __________ provides a location for monitoring security-related events.

A)firewall
B)choke point
C)LAN
D)secured operating system
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
8
the internal firewall provides a measure of access control and
protection for the DMZ systems consistent with their need for external connectivity.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
9
the firewall provides an additional layer of defense, insulating
internal systems from external networks or other parts of the internal network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
10
__________ determines the direction in which particular service requests may be initiated and allowed to flow through the firewall.

A)Behavior control
B)Service control
C)Direction control
D)User control
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
11
Analyzers are responsible for collecting dat
A.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
12
A circuit-level gateway permits an end-to-end tCP connection.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
13
the user control feature is typically applied to users outside the
firewall perimeter.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
14
Multiple internal firewalls can be used to protect portions of the
internal network from each other.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
15
__________ controls how particular services are used.

A)User control
B)Direction control
C)Service control
D)Behavior control
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
16
A firewall may filter traffic on the basis of IP address, protocol, or
port number.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
17
Packet filter gateways tend to be more secure than application-
level gateways.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
18
A firewall may not act as a packet filter.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
19
the first step in a DDoS attack is for the attacker to infect a
number of machines with zombie software that will ultimately be
used to carry out the attack.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
20
A stateful packet inspection firewall reviews the same packet
information as a packet filtering firewall, but also records information about tCP connections.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
21
Between internal and external firewalls are one or more networked devices in a region referred to as a __________ network.

A)demilitarized zone
B)war zone
C)safe zone
D)protected zone
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
22
the countermeasure for __________ is to discard packets with an inside source address if the packet arrives on an external interface.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
23
there are four techniques that firewalls use to control access and enforce the site's security policy: service control, direction control, user control, and __________ .
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
24
__________ can more readily see the intended outcome of an attempted attack because they can directly access and monitor the data files and system processes usually targeted by attacks.

A)Host-based IDSs
B)External firewalls
C)User interfaces
D)Sensors
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
25
A(n) __________ is placed at the edge of a local or enterprise network, just inside the boundary router that connects to the Internet or some wide area network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
26
A(n) __________ is hardware or software products that gather and analyze information from various areas within a computer or a network for the purpose of finding, and providing real-time or near-real-time warning of, attempts to access system resources in an unauthorized manner.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
27
An application-level gateway, also called a(n) __________ , acts as a relay of application-level traffic.

A)application proxy
B)relay proxy
C)source proxy
D)program proxy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
28
Systems that are externally accessible but need some protections are usually located on _________ networks.

A)IDS
B)DMZ
C)DMARC
D)ISP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
29
A __________ monitors network traffic for particular network segments or devices and analyzes network, transport, and application protocols to identify suspicious activity.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
30
A __________ is a computer program that can copy itself and infect a computer without permission or knowledge of the user.

A)worm
B)virus
C)rootkit
D)trojan horse
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
31
An __________ is violations of security policy, usually characterized as attempts to affect the confidentiality, integrity, or availability of a computer or network.

A)anomaly
B)IDS
C)intrusion
D)analyzer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
32
A __________ is an undocumented way of gaining access to a computer system.

A)backdoor
B)rootkit
C)bot
D)virus
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
33
An IDS comprises three logical components: sensors, __________ , and user interface.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
34
A __________ attack can be defeated by enforcing a rule that the first fragment of a packet must contain a predefined minimum amount of the transport header.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
35
A typical use of __________ is a situation in which the system administrator trusts the internal users.

A)DMZ networks
B)firewalls
C)circuit-level gateways
D)IDSs
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
36
Data collection, correlation, alerting, and reporting/compliance are all key elements of ___________ .

A)incident management
B)reflector DDoS
C)direct DDoS
D)malware
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
37
the __________ to an IDS enables a user to view output from the system or
control the behavior of the system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
38
A __________ firewall applies a set of rules to each incoming and outgoing IP packet and then forwards or discards the packet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
39
__________ control determines the types of Internet services that can be accessed, inbound or outbound.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
40
A scanning strategy that uses information contained on an infected victim machine to find more hosts to scan is the __________ method.

A)random
B)hit list
C)topological
D)local subnet
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
41
__________ is the identification, collection, examination, and analysis of data while preserving the integrity of the information and maintaining a strict chain of custody for the dat
A.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
42
there are two general approaches to intrusion detection: Misuse detection
and ___________ .
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
43
A __________ attack attempts to consume the target's resources so that it
cannot provide service.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
44
Information security ___________ consists of processes for detecting,
reporting, assessing, responding to, dealing with, and learning from
information security incidents.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
45
Malicious software, commonly called __________ , is perhaps the most
significant security threat to organizations.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.