Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
11 Cards in this Set
- Front
- Back
Which statement(s) about port security is correct? 5) Certain network switches can detect duplicate MAC addresses |
* Attackers can simply plug into a network connection and gain access if ports aren't secured * One method of increasing port security is to disable unused, open ports * Certain network switches can detect duplicate MAC addresses |
|
Which descriptions of security and assessment tools are correct? 1) OVAL is an open, interoperable language which can be used to detect network vulnerabilities, work with different applications, and share results with others |
* OVAL is an open, interoperable language which can be used to detect network vulnerabilities, work with different applications, and share results with others * Port scanners detect running services on open ports |
|
Watering hole attack |
A hacker infects a web site that an organization knows and trusts with malware |
|
Typo squatting |
A hacker tricks a user into navigating to a web site that has a similar name to a legitimate site |
|
How are assessment tools used to secure a network? |
* Vulnerability scanners are used to map network devices |
|
You're a network administrator. |
* Connect a device that uses EAP requests to a network switch |
|
What are guidelines for securing a switch? |
* Regularly install firmware updates on switches * Protect against loops using spanning tree protocols * Select a single secure communications method such as Secure Shell, or SSH * Logically separate networks using VLANS |
|
What are characteristics of host-based firewalls? |
* They're capable of performing basic packet filtering * They can be used on workstations in an enterprise network * They provide protection for hosts only |
|
What are the advantages of subnetting? |
* It provides a further level of access control * It increases network performance * It improves ease of management * It limits packet capture * It reduces the potential impact of malware |
|
What are the functions of an IPS? |
* An IPS reacts actively to threats against the network * An IPS monitors network and system activities for threats |
|
Add something |
Add something |