click below
click below
Normal Size Small Size show me how
Security+ Chap 7
Chapter 7 Administering a Secure Network
Question | Answer |
---|---|
cloud computing | A pay-per-use computing model in which customers pay only for the computing resources that they need, and the resources can be easily scaled. |
disabling unused ports | A security technique to turn off ports on a network device that are not required. |
File Transfer Protocol (FTP) | An unsecure TCP/IP protocol that is commonly used for transferring files. |
flood guard | A feature that controls a device's tolerance for unanswered service requests and helps to prevent a DoS attack. |
FTP using Secure Sockets Layer (FTPS) | A TCP/IP protocol that uses Secure Sockets Layer/Transport Layer Security (SSL/TLS) to encrypt commands sent over the control port (Port 21) in an FTP session. |
IEEE.802.1X | A standard that blocks all traffic on a port-by-port basis until the client is authenticated using credentials stored on an authentication server. |
Internet Control Message Protocol (ICMP) | A TCP/IP protocol that is used by devices to communicate updates or error information to other devices. |
Internet Protocol version 6 (IPv6) | The next generation of the IP protocol that addresses weaknesses of IPv4 and provides several significant improvements. |
IP telephony | Using a data-based IP network to add digital voice clients and new voice applications onto the IP network. |
loop protection | Preventing broadcast storms by using the IEEE 802.1d standard spanning-tree algorithm (STA). |
MAC limiting and filtering | A security technique to limit the number of media access control (MAC) addresses allowed on a single port. |
rule-based management | The process of administration that relies on following procedural and technical rules. |
Secure Copy Protocol (SCP) | A TCP/IP protocol used mainly on UNIX and Linux devices that securely transports files by encrypting files and commands. |
Secure FTP (SFTP) | A secure TCP/IP protocol that is used for transporting files by encrypting and compressing all data and commands. |
Simple Network Management Protocol (SNMP) | A TCP/IP protocol that exchanges management information between networked devices. It allows network administrators to remotely monitor, manage, and configure devices on the network. |
Transmission Control Protocol/Internet Protocol (TCP/IP) | The most common protocol suite used today for local area networks (LANS) and the Internet. |
virtualization | A means of managing and presenting computer resources by function without regard to their physical layout or location. |
How many layers does the TCP/IP architecture use? | Four |
What are the valid Internet Control Message Protocol (ICMP) Type 3 error messages? | Network unreachable, Host unreachable, Protocol unreachable, Source route failed, Destination network unknown, Destination host unknown, Communication with destination network administratively prohibited, and Host unreachable for type of service. |
Name the attacks use ICMP? | Network discovery, Smurf DoS attack, ICMP redirect attack, and Ping of Death |