Deck 6: Network Security

Full screen (f)
exit full mode
Question
Behavior-based monitoring attempts to overcome the limitations of both anomaly-based monitoring and signature-based monitoring by being more adaptive and proactive instead of reactive.
Use Space or
up arrow
down arrow
to flip the card.
Question
A basic level of security can be achieved through using the security features found in network hardware.
Question
A(n) ____ can block malicious content in "real time" as it appears without first knowing the URL of a dangerous site.

A) application gateway
B) security proxy
C) Web security gateway
D) firewall
Question
A ____ is a network device that can forward packets across computer networks.

A) switch
B) router
C) bridge
D) firewall
Question
Each operation in a computing environment starts with a ____.

A) system call
B) unit call
C) hardware instruction
D) system exception
Question
Security is enhanced by subnetting a single network into multiple smaller subnets in order to isolate groups of hosts.
Question
____ keeps a record of the state of a connection between an internal computer and an external device and then makes decisions based on the connection as well as the conditions.

A) Stateful frame filtering
B) Stateless frame filtering
C) Stateful packet filtering
D) Stateless packet filtering
Question
The OSI model breaks networking steps down into a series of six layers.
Question
____ IP addresses are IP addresses that are not assigned to any specific user or organization.

A) Public
B) Private
C) Public domain
D) Private domain
Question
A ____ is a standard network device for connecting multiple Ethernet devices together by using twisted-pair copper or fiber-optic cables in order to make them function as a single network segment.

A) switch
B) router
C) firewall
D) hub
Question
____ is a technique that allows private IP addresses to be used on the public Internet.

A) PAT
B) PNAT
C) NAPT
D) NAT
Question
Examining network traffic, activity, transactions, or behavior and looking for well-known patterns is known as ____-based monitoring

A) application
B) protocol
C) packet
D) signature
Question
A(n) ____ is the end of the tunnel between VPN devices.

A) endpoint
B) client
C) server
D) proxy
Question
A(n) ____ does not serve clients, but instead routes incoming requests to the correct server.

A) forward proxy
B) application proxy
C) system proxy
D) reverse proxy
Question
____ is a technology that can help to evenly distribute work across a network.

A) Stateful packet filtering
B) Load balancing
C) DNS caching
D) DNS poisoning
Question
Layer 3 of the OSI model is the ____ layer.

A) Network
B) Data Link
C) Session
D) Presentation
Question
A(n) ____ encrypts all data that is transmitted between the remote device and the network.

A) IKE tunnel
B) VPN
C) endpoint
D) router
Question
Workgroup switches must work faster than core switches.
Question
A ____ is a computer or an application program that intercepts a user request from the internal secure network and then processes that request on behalf of the user.

A) proxy server
B) DNS server
C) VPN server
D) telnet server
Question
Layer 5 of the OSI model is the ____ layer.

A) Network
B) Data Link
C) Session
D) Presentation
Question
IP addresses are ____-bit addresses.

A) 4
B) 8
C) 16
D) 32
Question
Discuss the two advantages that NAT provides.
Question
Describe all-in-one network security appliances.
Question
What are the two TCP/IP protocols used by e-mail systems to send and receive messages?
Question
____ is typically used on home routers that allow multiple users to share one IP address received from an Internet service provider (ISP).

A) PAT
B) NAT
C) PAN
D) PNAT
Question
List and describe three features of Internet content filters.
Question
The key to the OSI reference model is ____________________.
Question
NAT replaces a private IP address with a(n) ____________________ IP address.
Question
In order to allow untrusted outside users access to resources such as Web servers, most networks employ a ____.

A) bastion
B) choke
C) DMZ
D) reduction point
Question
A ____ allows scattered users to be logically grouped together even though they may be attached to different switches.

A) subnet
B) broadcast domain
C) DMZ
D) VLAN
Question
Internet ____________________ filters monitor Internet traffic and block access to preselected Web sites and files.
Question
Networks are usually segmented by using ____________________ to divide the network into a hierarchy.
Question
Describe the difference between an active NIDS and a passive NIDS.
Question
Describe how NAC works.
Question
List and describe two advantages of a proxy server.
Question
____________________ work occasionally or regularly from a home office.
Question
List and describe three advantages to subnetting.
Question
____ switches are connected directly to the devices on a network.

A) Workgroup
B) Distribution
C) Core
D) Intermediate
Question
____ provides remote users with the same access and functionality as local users through a VPN or dial-up connection.

A) Extranet
B) Remote access
C) Intranet
D) Virtual access
Question
Describe the difference between subnetting and VLANs.
Question
Describe how VLAN communication takes place.
Question
Match between columns
Each packet is given the same IP address but a different TCP port number.
DMZ
Each packet is given the same IP address but a different TCP port number.
OSI model
Each packet is given the same IP address but a different TCP port number.
Baseline
Each packet is given the same IP address but a different TCP port number.
HIDS
Each packet is given the same IP address but a different TCP port number.
NAT
Each packet is given the same IP address but a different TCP port number.
PAT
Each packet is given the same IP address but a different TCP port number.
Subnet addressing
Each packet is given the same IP address but a different TCP port number.
VLAN
Each packet is given the same IP address but a different TCP port number.
Remote access
Segmenting a network by separating devices into logical groups
DMZ
Segmenting a network by separating devices into logical groups
OSI model
Segmenting a network by separating devices into logical groups
Baseline
Segmenting a network by separating devices into logical groups
HIDS
Segmenting a network by separating devices into logical groups
NAT
Segmenting a network by separating devices into logical groups
PAT
Segmenting a network by separating devices into logical groups
Subnet addressing
Segmenting a network by separating devices into logical groups
VLAN
Segmenting a network by separating devices into logical groups
Remote access
A software-based application that runs on a local host computer that can detect an attack as it occurs
DMZ
A software-based application that runs on a local host computer that can detect an attack as it occurs
OSI model
A software-based application that runs on a local host computer that can detect an attack as it occurs
Baseline
A software-based application that runs on a local host computer that can detect an attack as it occurs
HIDS
A software-based application that runs on a local host computer that can detect an attack as it occurs
NAT
A software-based application that runs on a local host computer that can detect an attack as it occurs
PAT
A software-based application that runs on a local host computer that can detect an attack as it occurs
Subnet addressing
A software-based application that runs on a local host computer that can detect an attack as it occurs
VLAN
A software-based application that runs on a local host computer that can detect an attack as it occurs
Remote access
Refers to any combination of hardware and software that enables remote users to access a local internal network
DMZ
Refers to any combination of hardware and software that enables remote users to access a local internal network
OSI model
Refers to any combination of hardware and software that enables remote users to access a local internal network
Baseline
Refers to any combination of hardware and software that enables remote users to access a local internal network
HIDS
Refers to any combination of hardware and software that enables remote users to access a local internal network
NAT
Refers to any combination of hardware and software that enables remote users to access a local internal network
PAT
Refers to any combination of hardware and software that enables remote users to access a local internal network
Subnet addressing
Refers to any combination of hardware and software that enables remote users to access a local internal network
VLAN
Refers to any combination of hardware and software that enables remote users to access a local internal network
Remote access
Allows an IP address to be split anywhere within its 32 bits
DMZ
Allows an IP address to be split anywhere within its 32 bits
OSI model
Allows an IP address to be split anywhere within its 32 bits
Baseline
Allows an IP address to be split anywhere within its 32 bits
HIDS
Allows an IP address to be split anywhere within its 32 bits
NAT
Allows an IP address to be split anywhere within its 32 bits
PAT
Allows an IP address to be split anywhere within its 32 bits
Subnet addressing
Allows an IP address to be split anywhere within its 32 bits
VLAN
Allows an IP address to be split anywhere within its 32 bits
Remote access
Used to classify standard network devices based on their function
DMZ
Used to classify standard network devices based on their function
OSI model
Used to classify standard network devices based on their function
Baseline
Used to classify standard network devices based on their function
HIDS
Used to classify standard network devices based on their function
NAT
Used to classify standard network devices based on their function
PAT
Used to classify standard network devices based on their function
Subnet addressing
Used to classify standard network devices based on their function
VLAN
Used to classify standard network devices based on their function
Remote access
Each outgoing packet is given a different IP address
DMZ
Each outgoing packet is given a different IP address
OSI model
Each outgoing packet is given a different IP address
Baseline
Each outgoing packet is given a different IP address
HIDS
Each outgoing packet is given a different IP address
NAT
Each outgoing packet is given a different IP address
PAT
Each outgoing packet is given a different IP address
Subnet addressing
Each outgoing packet is given a different IP address
VLAN
Each outgoing packet is given a different IP address
Remote access
A reference set of data against which operational data is compared
DMZ
A reference set of data against which operational data is compared
OSI model
A reference set of data against which operational data is compared
Baseline
A reference set of data against which operational data is compared
HIDS
A reference set of data against which operational data is compared
NAT
A reference set of data against which operational data is compared
PAT
A reference set of data against which operational data is compared
Subnet addressing
A reference set of data against which operational data is compared
VLAN
A reference set of data against which operational data is compared
Remote access
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/42
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 6: Network Security
1
Behavior-based monitoring attempts to overcome the limitations of both anomaly-based monitoring and signature-based monitoring by being more adaptive and proactive instead of reactive.
True
2
A basic level of security can be achieved through using the security features found in network hardware.
True
3
A(n) ____ can block malicious content in "real time" as it appears without first knowing the URL of a dangerous site.

A) application gateway
B) security proxy
C) Web security gateway
D) firewall
C
4
A ____ is a network device that can forward packets across computer networks.

A) switch
B) router
C) bridge
D) firewall
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
5
Each operation in a computing environment starts with a ____.

A) system call
B) unit call
C) hardware instruction
D) system exception
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
6
Security is enhanced by subnetting a single network into multiple smaller subnets in order to isolate groups of hosts.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
7
____ keeps a record of the state of a connection between an internal computer and an external device and then makes decisions based on the connection as well as the conditions.

A) Stateful frame filtering
B) Stateless frame filtering
C) Stateful packet filtering
D) Stateless packet filtering
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
8
The OSI model breaks networking steps down into a series of six layers.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
9
____ IP addresses are IP addresses that are not assigned to any specific user or organization.

A) Public
B) Private
C) Public domain
D) Private domain
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
10
A ____ is a standard network device for connecting multiple Ethernet devices together by using twisted-pair copper or fiber-optic cables in order to make them function as a single network segment.

A) switch
B) router
C) firewall
D) hub
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
11
____ is a technique that allows private IP addresses to be used on the public Internet.

A) PAT
B) PNAT
C) NAPT
D) NAT
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
12
Examining network traffic, activity, transactions, or behavior and looking for well-known patterns is known as ____-based monitoring

A) application
B) protocol
C) packet
D) signature
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
13
A(n) ____ is the end of the tunnel between VPN devices.

A) endpoint
B) client
C) server
D) proxy
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
14
A(n) ____ does not serve clients, but instead routes incoming requests to the correct server.

A) forward proxy
B) application proxy
C) system proxy
D) reverse proxy
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
15
____ is a technology that can help to evenly distribute work across a network.

A) Stateful packet filtering
B) Load balancing
C) DNS caching
D) DNS poisoning
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
16
Layer 3 of the OSI model is the ____ layer.

A) Network
B) Data Link
C) Session
D) Presentation
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
17
A(n) ____ encrypts all data that is transmitted between the remote device and the network.

A) IKE tunnel
B) VPN
C) endpoint
D) router
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
18
Workgroup switches must work faster than core switches.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
19
A ____ is a computer or an application program that intercepts a user request from the internal secure network and then processes that request on behalf of the user.

A) proxy server
B) DNS server
C) VPN server
D) telnet server
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
20
Layer 5 of the OSI model is the ____ layer.

A) Network
B) Data Link
C) Session
D) Presentation
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
21
IP addresses are ____-bit addresses.

A) 4
B) 8
C) 16
D) 32
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
22
Discuss the two advantages that NAT provides.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
23
Describe all-in-one network security appliances.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
24
What are the two TCP/IP protocols used by e-mail systems to send and receive messages?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
25
____ is typically used on home routers that allow multiple users to share one IP address received from an Internet service provider (ISP).

A) PAT
B) NAT
C) PAN
D) PNAT
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
26
List and describe three features of Internet content filters.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
27
The key to the OSI reference model is ____________________.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
28
NAT replaces a private IP address with a(n) ____________________ IP address.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
29
In order to allow untrusted outside users access to resources such as Web servers, most networks employ a ____.

A) bastion
B) choke
C) DMZ
D) reduction point
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
30
A ____ allows scattered users to be logically grouped together even though they may be attached to different switches.

A) subnet
B) broadcast domain
C) DMZ
D) VLAN
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
31
Internet ____________________ filters monitor Internet traffic and block access to preselected Web sites and files.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
32
Networks are usually segmented by using ____________________ to divide the network into a hierarchy.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
33
Describe the difference between an active NIDS and a passive NIDS.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
34
Describe how NAC works.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
35
List and describe two advantages of a proxy server.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
36
____________________ work occasionally or regularly from a home office.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
37
List and describe three advantages to subnetting.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
38
____ switches are connected directly to the devices on a network.

A) Workgroup
B) Distribution
C) Core
D) Intermediate
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
39
____ provides remote users with the same access and functionality as local users through a VPN or dial-up connection.

A) Extranet
B) Remote access
C) Intranet
D) Virtual access
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
40
Describe the difference between subnetting and VLANs.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
41
Describe how VLAN communication takes place.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
42
Match between columns
Each packet is given the same IP address but a different TCP port number.
DMZ
Each packet is given the same IP address but a different TCP port number.
OSI model
Each packet is given the same IP address but a different TCP port number.
Baseline
Each packet is given the same IP address but a different TCP port number.
HIDS
Each packet is given the same IP address but a different TCP port number.
NAT
Each packet is given the same IP address but a different TCP port number.
PAT
Each packet is given the same IP address but a different TCP port number.
Subnet addressing
Each packet is given the same IP address but a different TCP port number.
VLAN
Each packet is given the same IP address but a different TCP port number.
Remote access
Segmenting a network by separating devices into logical groups
DMZ
Segmenting a network by separating devices into logical groups
OSI model
Segmenting a network by separating devices into logical groups
Baseline
Segmenting a network by separating devices into logical groups
HIDS
Segmenting a network by separating devices into logical groups
NAT
Segmenting a network by separating devices into logical groups
PAT
Segmenting a network by separating devices into logical groups
Subnet addressing
Segmenting a network by separating devices into logical groups
VLAN
Segmenting a network by separating devices into logical groups
Remote access
A software-based application that runs on a local host computer that can detect an attack as it occurs
DMZ
A software-based application that runs on a local host computer that can detect an attack as it occurs
OSI model
A software-based application that runs on a local host computer that can detect an attack as it occurs
Baseline
A software-based application that runs on a local host computer that can detect an attack as it occurs
HIDS
A software-based application that runs on a local host computer that can detect an attack as it occurs
NAT
A software-based application that runs on a local host computer that can detect an attack as it occurs
PAT
A software-based application that runs on a local host computer that can detect an attack as it occurs
Subnet addressing
A software-based application that runs on a local host computer that can detect an attack as it occurs
VLAN
A software-based application that runs on a local host computer that can detect an attack as it occurs
Remote access
Refers to any combination of hardware and software that enables remote users to access a local internal network
DMZ
Refers to any combination of hardware and software that enables remote users to access a local internal network
OSI model
Refers to any combination of hardware and software that enables remote users to access a local internal network
Baseline
Refers to any combination of hardware and software that enables remote users to access a local internal network
HIDS
Refers to any combination of hardware and software that enables remote users to access a local internal network
NAT
Refers to any combination of hardware and software that enables remote users to access a local internal network
PAT
Refers to any combination of hardware and software that enables remote users to access a local internal network
Subnet addressing
Refers to any combination of hardware and software that enables remote users to access a local internal network
VLAN
Refers to any combination of hardware and software that enables remote users to access a local internal network
Remote access
Allows an IP address to be split anywhere within its 32 bits
DMZ
Allows an IP address to be split anywhere within its 32 bits
OSI model
Allows an IP address to be split anywhere within its 32 bits
Baseline
Allows an IP address to be split anywhere within its 32 bits
HIDS
Allows an IP address to be split anywhere within its 32 bits
NAT
Allows an IP address to be split anywhere within its 32 bits
PAT
Allows an IP address to be split anywhere within its 32 bits
Subnet addressing
Allows an IP address to be split anywhere within its 32 bits
VLAN
Allows an IP address to be split anywhere within its 32 bits
Remote access
Used to classify standard network devices based on their function
DMZ
Used to classify standard network devices based on their function
OSI model
Used to classify standard network devices based on their function
Baseline
Used to classify standard network devices based on their function
HIDS
Used to classify standard network devices based on their function
NAT
Used to classify standard network devices based on their function
PAT
Used to classify standard network devices based on their function
Subnet addressing
Used to classify standard network devices based on their function
VLAN
Used to classify standard network devices based on their function
Remote access
Each outgoing packet is given a different IP address
DMZ
Each outgoing packet is given a different IP address
OSI model
Each outgoing packet is given a different IP address
Baseline
Each outgoing packet is given a different IP address
HIDS
Each outgoing packet is given a different IP address
NAT
Each outgoing packet is given a different IP address
PAT
Each outgoing packet is given a different IP address
Subnet addressing
Each outgoing packet is given a different IP address
VLAN
Each outgoing packet is given a different IP address
Remote access
A reference set of data against which operational data is compared
DMZ
A reference set of data against which operational data is compared
OSI model
A reference set of data against which operational data is compared
Baseline
A reference set of data against which operational data is compared
HIDS
A reference set of data against which operational data is compared
NAT
A reference set of data against which operational data is compared
PAT
A reference set of data against which operational data is compared
Subnet addressing
A reference set of data against which operational data is compared
VLAN
A reference set of data against which operational data is compared
Remote access
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 42 flashcards in this deck.