Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
24 Cards in this Set
- Front
- Back
A software or hardware that checks information coming from the Internet and depending on the applied configuration settings either blocks it or allows it to pass through is called: |
Firewall |
|
A device designed to forward data packets between networks is called: |
Router |
|
Allowing a program through a firewall is known as creating |
Exception |
|
A network device designed for managing the optimal distribution of workloads across multiple computing resources is called: |
Load balancer |
|
The last default rule on a firewall is to: |
Deny all traffic |
|
A computer network service that allows clients to make indirect network connections to other network services is called: |
Proxy |
|
A solution designed for filtering malicious / restricted content from entering corporate networks is known as: |
Web security gateway |
|
One of the measures for securing networking devices includes the practice of disabling unused ports. |
True |
|
What type of protocols ensure the privacy of a VPN connection? |
Tunneling |
|
Which of the following answers refers to a dedicated device for managing secure connections established over an untrusted network, such as the Internet? |
VPN concentrator |
|
Which of the following acronyms refers to a network or host based monitoring system designed to automatically alert administrators of known or suspected unauthorized activity? |
IDS (Intrusion Detection System) |
|
A software tool used to monitor and examine contents of network traffic is known as: (Select 2 answers) |
SMTP (Simple Mail Transfer Protocol) Port# 25 |
|
Which of the following acronyms refers to a network security solution combining the functionality of a firewall with additional safeguards such as URL filtering, content inspection, or malware inspection? |
UTM (Unified Threat Management) |
|
URL filtering restricts access to Internet sites based on which of the following criteria? |
Web address |
|
Which of the following network security solutions inspects network traffic in real-time and has the capability to stop the ongoing attack? |
NIPS (Network Intrusion Prevention System) |
|
Which of the following acronyms refers to a firewall controlling access to a web server? |
WAF (Web Application-based Firewall) |
|
Which of the following answers refers to a set of rules that specify which users or system processes are granted access to objects as well as what operations are allowed on a given object? |
ACL (Access Control List) |
|
Which of the following actions can be taken by passive IDS? (Select 2 answers) |
Logging / Sending an alert |
|
802.1x is an IEEE standard defining: |
Port-based network access control |
|
An access control model in which access to resources is granted or denied depending on Access Control List (ACL) entries is also known as: |
Rule-Based Access Control |
|
Which type of Intrusion Detection System (IDS) relies on the previously established baseline of normal network activity in order to detect intrusions? |
Anomaly-based |
|
Which of the following security solutions provides a countermeasure against denial-of-service attack characterized by increasing number of half-open connections? |
Flood guard |
|
Which of the following protocols protects against switching loops? |
STP (Spanning Tree Protocol) |
|
Which type of Intrusion Detection System (IDS) relies on known attack patterns to detect an intrusion? |
Signature-based |