Save
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

IS316

VPN

QuestionAnswer
What are security Objectives Goals an organization strives to achieve through its security efforts. 3 primary security objectives are confidentiality, integrity, and Availability.
Encryption is primarily concerned with which of the primary objectives? Confidentiality
Who is responsible for network security? Everyone
Which Security group is responsible for managing network vulnerabilities and threats IT Security staff
What are the 2 elements of network design that have the greatest risk of causing DoS? Single point of failure & a bottle neck
Which of the following is true regarding a layer 2 address and layer 3 address? Layer 2 address can be filtered with MAC address filtering
Personnel should be authenticated and authorized prior to being granted access to company’s information resources. This statement is an example of which of the following? policy
which is the most important consideration when designing a network? Scalability
What can you detect by analyzing a data packet? network vulnerabilities
Which of the following is true about NetWitness Investigator? supports IPv6 only
Which of the following is not covered by a data loss/data leak prevention tool? Paper documents.
Which of the following is not a purpose of network analysis? Detect security policy violations
Where do you capture network data to analyze inbound/ outbound network traffic? Inside the perimeter firewall
Promiscuous mode (IPS) is most commonly associated with which of the following? A network interface
What is a firewall? A filtering device that enforces network security policy and protects the network against external attacks
Which network component filters traffic between nodes? Firewall
What type off firewall keeps track of state tables to sieve network traffic Statefull firewall
Which protocol is a connected-oriented protocol that operates at the transport layer of the osi model and supports reliable connections? TCP/IP
What can you accomplish by filtering network packets? ?
What does an application-level proxy do? A type of firewall that filters on a specific applications content and session info.
What is ingress filtering? Monitoring traffic on its way inbound
Content filtering can focus on the following aspects of traffic except? Source or destination IP address
Which of the following will prevent firewall filtering from blocking malicious content? Encrypted traffic
Dynamic packet filtering is also known as... Stateful inspection
Which of the following is a problem for static filtering? Random source ports
Which of the following characteristics does not apply to stateful firewalls Analyze static data only
What is used by TCP to establish a session between 2 systems? a three-way handshake
When planning a firewall implementation, which of the following is the key consideration? Availability Address space Skill set of support personnel All of these
What are the benefits of using VPNs? Cost savings, and network scalability. To the clients accessing these networks, and ease of use.
Which of the following is not ensured or provided by a secured VPN? Quality of service
Which of the following techniques makes a VPN private? A single organization owning all the supporting infrastructure components
What form of VPN deployment prevents VPN traffic from being filtered? Corporate Firewall
Which aspect of the VPN prevents others from eavesdropping and observation? Symmetric Cryptography
What form of VPN deployment requires additional authentication for accessing? resources across the VPN edge router
What are the two most important features of VPN authentication? Scalability and interoperability
What is usually the first activity in the hacking process Reconnaissance or footprinting
What type of attack can result in arbitrary code execution with system level privileges? Buffer overflow
Most exploits are based on the existence of what? System anomalies
What form of attack can potentially evade an IDS? Insertion
What form of attack captures authentication packets to transmit them later? Replay
Which exploit takes advantage of variable MTUs? Fragmentation
Which form of attack submits excessive data to a target to cause arbitrary code execution Buffer overflow
Which of the following might a hacker offer as a service? Dos Spam Distribution Password Hacking
Which of the following IT domain is most vulnerable to social engineering? User
Which of the following is a social engineering technique? Impersonation Reciprocity Phishing
what are the characteristics included in a reverse proxy Caching
Which of the following is not an important factor when included as part of network design? Obscurity
Logging what time a user accessed a particular resource is an example of which of the following? Accounting
Which IT infrastructure domain does not require firewalls to be included as part of its network design? User domain
What is the benefit of private addressing that is not present in public address? Isolation from the internet
Which domain marks the boundary where the private network meets the public network? LAN-to-WAN
To develop an AUP, you need to __________ ? Establish baseline rules
What is not an element of System hardening? Implementing ingress and egress filtering against spoof addresses
Uninstalling all unnecessary applications and services is an example of what? System hardening
What is not usually a part of System hardening? Installing additional RAM
Purpose of authentication? Verify entity identity
Firewall host fails and reverts to a state where all communications between the internet and DMZ is cut off displays what kind of defense? Fail-close
Purpose of physical security access control is to... Limit interaction between people and devices
Incident response is a planned reaction to a negative situation or events. what is not a common step or phase in an incident response? Assessment
The only protection against data loss is... Backup and recovery
Common mistakes or security problems that should not be addressed in awareness training? Using resources from other subnets of which the host is not a member
NOT security management best practices Assign maximum required permissions
NOT a valid incident response strategy phase Collection
NOT the best security management tools Expensive commercial products
purpose of security checklist Ensure all security elements are still effective
An admin must organize to ensure follow-through of a new security plan... End-user training and awareness
Steps of security assessment... Perform risk assessment, penetration test, and vulnerability scan
Fingerprint use to unlock a workstation is an example of what? Something you are
primary purpose of log monitoring? Detect reconnaissance attempts
Where should the firewall rules which explicitly deny traffic be placed At the bottom
What is the most important practice associated with firewall logging? Understanding how to interpret firewall logs
Which firewall limitation is typically characterized by a memory-based exploit? Buffer overflow
Building your own firewall can result in what? Cost savings
Dealing with a firewall emergency what should you not do? Document you network
Valid network monitoring tool SmokePing`
True for VPN? Works across the Internet, not the intranet
default deny appears where in the rule set? Last
mechanism allows a firewall to hand off authentication to a dedicated service hosted on a different system IEEE 802.1x
First deploying a firewall and choosing to begin logging activity, what should you include in log file ALL events including malicious traffic, Dos traffic, dropped packets, allowed packets
Event in firewall log which is a clue of a rogue host operating within the private network Packets from unassigned internal address
Not a limitation or potential weakness of a firewall Using first match apply rule systems
wont inprove or maintain performing of a firewall Native antivirus scannning
Form of encryption allows a firewall to filter based on original source and destination address(assume the firewall is located along the path between session endpoints?) Transport mode
NOT a viable option for enterprise network that needs control and filter network traffic Physical firewall
Use for a reverse proxy Offer external entities access to an internal web server
Most important aspect or feature of a bastion host OS Resistance to attacks and compromise attempts
What is always the most important element within a firewall rule set? Final rule of default-deny
Created by: dadoftwins
Popular Computers sets

 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards