Save
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

securityCHPT6

terms

QuestionAnswer
iso international organization
iso released a set of specifications that was intended to describe how dissimiliar computers could be connected together over the network
osi reference model illustartes how a network device prepares data for delivery over the network and how it is handled once it is received
hub standard network device that connects multiple ethernet devices together using cables to make them function as a single network segment
switch device that connects network segments
switch can learn which device is connected to its ports and forward framws intended for a specific device
port mirroring used on a network switch to send a copy of network packets seen on one switch port (or an entire VLAN) to a network
network tap separate device that can be installed between two network devices to monitoe traffic
network tap hardware device which provides a way to access the data flowing across a computer network. In many cases, it is desirable for a third party to monitor the traffic between two points in the network
router network device that can forward packets across computer networks
load balancing technology that can help evenly distribute work across a network
host based software firewall runs as a program on a local system to filter traffic
hardware based network firewall designed to inspect packets and either accept or deny entry
block prevent the packet from passing over the network by dropping it
prompt ask what action to take
rule based firewall used a set of individual instructions to control the actions
settings based firewall allows the administrator to create sets of related parameters that together define one aspect of the devices operation
stateful packet filtering keeps a record of the state of a connection between an internal computer and an external device and then makes decisions based on the connection as well as the conditions
web application firewall looks more deeply into packets that carry http traffic based on applications that function at the application layer layer seven
proxy person who is authorized to act as the substitute or agent on behalf of another person
stateless packet filtering looks at the incoming packet and permits or denies it based on the conditions that have been set by the administrator
proxy server computer or application program that intercepts a user request from the internal secure network and then processes that request on behalf of the user
temporary storage area cache
proxy server advantages increased speed
proxy server advantages reduced costs
proxy server advantages improved management
proxy server advantages stronger security
reverse proxy routes incoming requests to the correct servers
tcp/ip email protocols smtp
tcp/ip email protocols pop
one method for filtering spam install its own corporate spam filter
install its own corporate spam filter install the spam filter with the smtp server
install its own corporate spam filter install the spam filter on the pop3 server
virtual private network a technology to use an unsecured public network like a secured private network
vpn concentrator a device that aggregates hundreds or thousands of vpn connections
internet content filter monitors traffic and block access to web sites and files
aspects of building a secure network network devices
aspects of building a secure network network technologies
aspects of building a secure network design of the network itself
osi model network devices classified based on function
internet content filter features malware filtering
internet content filter features url and content filtering
internet content filter features prohibit file downloads
internet content filter features profiles
internet content filter features detailed reporting
intrusion detection system device designed to be active security,can detect an attack as it occurs
monitoring methodologies anomaly based monitoring
monitoring methodologies signature based monitoring
monitoring methodologies behavior based monitoring
monitoring methodologies heuristic monitoring
anomaly based monitoring designed for detecting statistical anomalies
signature based monitoring method for auditing usage is to examine network traffic,activity,transactions or behavior and look for well known patterns
signature based monitoring compares activities against a predefined signature
behavior based monitoring continuously analyzes the behavior of processes and programs on a system and alerts the user if it detects any abnormal actions
hubs works at layer one of the osi model
hubs not read data passed thru them
switches use mac addess to identify devices
switches operates at layer two
heuristic monitoring used by an ids that uses an algorithim to determine if a threat exists
ids intrusion detection system
host intrusion detection system software based application that runs on a local host computer that can detect an attack as it occurs
host intrusion detection systems monitor system calls
host intrusion detection systems monitor file system access
host intrusion detection systems monitor system registry settings
host intrusion detection systems monitor host input/output
system call instruction that interrupts the program being executed and requests a service from the operating system
windows registry maintains configuration information about programs and the computer
hids disadvantages cant monitor network traffic that doesnt reach local system
hids disadvantages all log data is stored locally
hids disadvantages resource intensive and slows down the system
network intrusion detection system techniques protocol stack verification
network intrusion detection system techniques application protocol verification
network intrusion detection system techniques create extended logs
passivs nids sounds an alarm and logs the event
active nids sound an alarm and take action
network intrusion prevention system active nids
load balance security advantages can stop attacks directed at a server or application
load balance security advantages can detect and prevent denial of service attacks
load balance security advantages hide http error pages
load balance security advantages remove server identification headers from http responses
multipurpose security appliances provide an array of security functions anti spam and anti phishing
multipurpose security appliances provide an array of security functions content filtering
multipurpose security appliances provide an array of security functions encryption
multipurpose security appliances provide an array of security functions firewall
multipurpose security appliances provide an array of security functions intrusion protection
network address translation allows private ip addresses to be used on the public internet
private ip address ip addresses that are not assigned to any specific user or organization
port address translation each packet is given the same ip address but a different tcp port number
nat advantage masks the ip addresses of in ternal device
nat advantage allows multiple devices to share a smaller number of public ip addresses
rule based firewall settings static in nature set of individual instructions to control actions
network access control examines the current state of a system or network device before it is allowed to connect to the network
nac method for directing the client to a quarantine network and then later to the production network dynamic host configuration protocol server
nac method for directing the client to a quarantine network and then later to the production network address resolution protocol poisoning
elements of a secure network design creating demilitarized zones
web application firewall block specific sites or specific known attacks
web application firewall can block xss and sql injection attacks
elements of a secure network design subnetting
elements of a secure network design using virtual lans
elements of a secure network design remote access
ip addresses are two addresses network address
ip addresses are two addresses host address
subnetting advantages flexibility
subnetting advantages decreased network traffic
subnetting advantages improved troubleshooting
subnetting advantages reflection of physical network
subnetting advantages minimal impact on external routers
subnetting advantages hide the internal network layout
core switches reside at the top of the hierarchy and carry traffic between switches
proxy servers intercepts and process requests
vlan allows scattered users to be logically grouped together even though they may be attached to different switches
vlan reduce network traffic
workgroup switches connected directly to the devices on the network
subnets subdivisions of ip address classes and allow a single class a,b,c network to be used instead of multiple networks
remote access refers to any combination of hardware and software that enables remote users to access a local internal network
nids technology that monitors network traffic to immediately react to block a malicious attack
mx record mail exchange record
mx record entry in the domain name system that identifies the mail server responsible for handling that domain name
tunneling protocols a packet is encrypted and enclosed within another packet
endpoint the end of the tunnel between vpn devices
hardware based vpns generally used for connecting two local area networks thru the vpn tunnel
hardware based vpns more secure,better performance,offer more flexibility
signature based monitoring looks for well known attaack signature patterns
behavior based monitoring alert user who decides whether to allow or block activity
basic types of intrusion detection system hids
basic types of intrusion detection system nids
demilitarized zone functions as a seperate network that rests outside the secure network parameter
demilitarized zone untrusted outside users can access the dmz but cannot enter the secure network
Created by: cgeaski
Popular Computers sets

 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards