• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/24

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

24 Cards in this Set

  • Front
  • Back

A software or hardware that checks information coming from the Internet and depending on the applied configuration settings either blocks it or allows it to pass through is called:

Firewall

A device designed to forward data packets between networks is called:

Router

Allowing a program through a firewall is known as creating

Exception

A network device designed for managing the optimal distribution of workloads across multiple computing resources is called:

Load balancer

The last default rule on a firewall is to:

Deny all traffic

A computer network service that allows clients to make indirect network connections to other network services is called:

Proxy

A solution designed for filtering malicious / restricted content from entering corporate networks is known as:

Web security gateway

One of the measures for securing networking devices includes the practice of disabling unused ports.

True

What type of protocols ensure the privacy of a VPN connection?

Tunneling

Which of the following answers refers to a dedicated device for managing secure connections established over an untrusted network, such as the Internet?

VPN concentrator

Which of the following acronyms refers to a network or host based monitoring system designed to automatically alert administrators of known or suspected unauthorized activity?

IDS (Intrusion Detection System)

A software tool used to monitor and examine contents of network traffic is known as:


(Select 2 answers)

SMTP (Simple Mail Transfer Protocol)


Port# 25

Which of the following acronyms refers to a network security solution combining the functionality of a firewall with additional safeguards such as URL filtering, content inspection, or malware inspection?

UTM (Unified Threat Management)

URL filtering restricts access to Internet sites based on which of the following criteria?

Web address

Which of the following network security solutions inspects network traffic in real-time and has the capability to stop the ongoing attack?

NIPS (Network Intrusion Prevention System)

Which of the following acronyms refers to a firewall controlling access to a web server?

WAF (Web Application-based Firewall)

Which of the following answers refers to a set of rules that specify which users or system processes are granted access to objects as well as what operations are allowed on a given object?

ACL (Access Control List)

Which of the following actions can be taken by passive IDS? (Select 2 answers)

Logging / Sending an alert

802.1x is an IEEE standard defining:

Port-based network access control

An access control model in which access to resources is granted or denied depending on Access Control List (ACL) entries is also known as:

Rule-Based Access Control

Which type of Intrusion Detection System (IDS) relies on the previously established baseline of normal network activity in order to detect intrusions?

Anomaly-based

Which of the following security solutions provides a countermeasure against denial-of-service attack characterized by increasing number of half-open connections?

Flood guard

Which of the following protocols protects against switching loops?

STP (Spanning Tree Protocol)

Which type of Intrusion Detection System (IDS) relies on known attack patterns to detect an intrusion?

Signature-based