Deck 13: Network Protection Systems
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/59
Play
Full screen (f)
Deck 13: Network Protection Systems
1
What is cryptanalysis?
As long as people attempt to create encryption algorithms to protect data,others will endeavor to break those encryption algorithms.This study is called cryptanalysis.It's taught in universities and by government organizations,but hackers also find the challenge of breaking an encryption algorithm intriguing and continue to push the envelope for developers of encryption algorithms.When a new encryption algorithm is developed,cryptanalysis is performed on it to ensure that breaking the code is impossible or would take so much time and so many resources to break that it would be impractical for hackers to attempt.
2
Match each item with a statement below.a.asymmetric algorithm
b.DEA
c.symmetric algorithm
d.certificate
e.hashing algorithm
f.birthday attacks
g.stream cipher
h.PKI
i.key
j.salt
Uses a single key to encrypt and decrypt data
b.DEA
c.symmetric algorithm
d.certificate
e.hashing algorithm
f.birthday attacks
g.stream cipher
h.PKI
i.key
j.salt
Uses a single key to encrypt and decrypt data
c
3
What is an encryption algorithm?
An encryption algorithm is a mathematical function or program that works with a key.The algorithm's strength and the key's secrecy determine how secure the encrypted data is.In most cases,the algorithm isn't a secret; it's known to the public.What is secret is the key.
4
Match each item with a statement below.a.asymmetric algorithm
b.DEA
c.symmetric algorithm
d.certificate
e.hashing algorithm
f.birthday attacks
g.stream cipher
h.PKI
i.key
j.salt
Uses two keys: one to encrypt data and one to decrypt data
b.DEA
c.symmetric algorithm
d.certificate
e.hashing algorithm
f.birthday attacks
g.stream cipher
h.PKI
i.key
j.salt
Uses two keys: one to encrypt data and one to decrypt data
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck
5
Match each item with a statement below.a.asymmetric algorithm
b.DEA
c.symmetric algorithm
d.certificate
e.hashing algorithm
f.birthday attacks
g.stream cipher
h.PKI
i.key
j.salt
A sequence of random bits generated from a range of allowable values
b.DEA
c.symmetric algorithm
d.certificate
e.hashing algorithm
f.birthday attacks
g.stream cipher
h.PKI
i.key
j.salt
A sequence of random bits generated from a range of allowable values
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck
6
What is the difference between a public key and a private key?
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck
7
Match each item with a statement below.a.asymmetric algorithm
b.DEA
c.symmetric algorithm
d.certificate
e.hashing algorithm
f.birthday attacks
g.stream cipher
h.PKI
i.key
j.salt
Encryption algorithm used for the Data Encryption Standard
b.DEA
c.symmetric algorithm
d.certificate
e.hashing algorithm
f.birthday attacks
g.stream cipher
h.PKI
i.key
j.salt
Encryption algorithm used for the Data Encryption Standard
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck
8
How can confidentiality and authentication be achieved using public key cryptography?
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck
9
What is Triple Data Encryption Standard (3DES)?
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck
10
How does public key infrastructure work?
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck
11
What is a digital signature?
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck
12
Match each item with a statement below.a.asymmetric algorithm
b.DEA
c.symmetric algorithm
d.certificate
e.hashing algorithm
f.birthday attacks
g.stream cipher
h.PKI
i.key
j.salt
Used for verification,takes a variable-length input and converts it to a fixed-length output string
b.DEA
c.symmetric algorithm
d.certificate
e.hashing algorithm
f.birthday attacks
g.stream cipher
h.PKI
i.key
j.salt
Used for verification,takes a variable-length input and converts it to a fixed-length output string
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck
13
Match each item with a statement below.a.asymmetric algorithm
b.DEA
c.symmetric algorithm
d.certificate
e.hashing algorithm
f.birthday attacks
g.stream cipher
h.PKI
i.key
j.salt
Operate on plaintext one bit at a time
b.DEA
c.symmetric algorithm
d.certificate
e.hashing algorithm
f.birthday attacks
g.stream cipher
h.PKI
i.key
j.salt
Operate on plaintext one bit at a time
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck
14
Match each item with a statement below.a.asymmetric algorithm
b.DEA
c.symmetric algorithm
d.certificate
e.hashing algorithm
f.birthday attacks
g.stream cipher
h.PKI
i.key
j.salt
The use of random data alongside plaintext as an input to a hashing function so that the output is unique
b.DEA
c.symmetric algorithm
d.certificate
e.hashing algorithm
f.birthday attacks
g.stream cipher
h.PKI
i.key
j.salt
The use of random data alongside plaintext as an input to a hashing function so that the output is unique
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck
15
Match each item with a statement below.a.asymmetric algorithm
b.DEA
c.symmetric algorithm
d.certificate
e.hashing algorithm
f.birthday attacks
g.stream cipher
h.PKI
i.key
j.salt
A digital document that verifies the two parties exchanging data over the Internet are really who they claim to be
b.DEA
c.symmetric algorithm
d.certificate
e.hashing algorithm
f.birthday attacks
g.stream cipher
h.PKI
i.key
j.salt
A digital document that verifies the two parties exchanging data over the Internet are really who they claim to be
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck
16
What is the RC5 algorithm?
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck
17
What is a one-way function? Provide an example or an analogy to help explain the concept.
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck
18
Match each item with a statement below.a.asymmetric algorithm
b.DEA
c.symmetric algorithm
d.certificate
e.hashing algorithm
f.birthday attacks
g.stream cipher
h.PKI
i.key
j.salt
A structure consisting of programs,protocols,and security policies for encrypting data and uses public key cryptography to protect data transmitted over the Internet
b.DEA
c.symmetric algorithm
d.certificate
e.hashing algorithm
f.birthday attacks
g.stream cipher
h.PKI
i.key
j.salt
A structure consisting of programs,protocols,and security policies for encrypting data and uses public key cryptography to protect data transmitted over the Internet
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck
19
What is a certificate?
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck
20
Match each item with a statement below.a.asymmetric algorithm
b.DEA
c.symmetric algorithm
d.certificate
e.hashing algorithm
f.birthday attacks
g.stream cipher
h.PKI
i.key
j.salt
Used to find the same hash value for two different inputs and reveal any mathematical weaknesses in a hashing algorithm
b.DEA
c.symmetric algorithm
d.certificate
e.hashing algorithm
f.birthday attacks
g.stream cipher
h.PKI
i.key
j.salt
Used to find the same hash value for two different inputs and reveal any mathematical weaknesses in a hashing algorithm
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck
21
To examine the router's routing table,a Cisco administrator would enter which command?
A) show running-config
B) show startup-config
C) show interfaces
D) show ip route
A) show running-config
B) show startup-config
C) show interfaces
D) show ip route
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck
22
A large organization that is responsible for sensitive or critical data may elect to create which of the following to do damage assessment,risk remediation,and legal consultation?
A) Security Information Center
B) Security Operations Center
C) Firewall Team
D) Security Event Team
A) Security Information Center
B) Security Operations Center
C) Firewall Team
D) Security Event Team
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck
23
What is a Unified Threat Management device?
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck
24
What configuration mode allows a Cisco administrator to configure router settings that affect the overall operations of the router?
A) Security configuration mode
B) Admin configuration mode
C) Global configuration mode
D) Interface configuration mode
A) Security configuration mode
B) Admin configuration mode
C) Global configuration mode
D) Interface configuration mode
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck
25
If a Cisco administrator needs to configure a serial or Fast Ethernet port,which configuration mode should they use?
A) Security configuration mode
B) Admin configuration mode
C) Global configuration mode
D) Interface configuration mode
A) Security configuration mode
B) Admin configuration mode
C) Global configuration mode
D) Interface configuration mode
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck
26
What type of firewall inspects network traffic at a higher level in the OSI model than a traditional stateful packet inspection firewall does?
A) DMZ firewall
B) stateless firewall
C) upper-layer firewall
D) application-aware firewall
A) DMZ firewall
B) stateless firewall
C) upper-layer firewall
D) application-aware firewall
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck
27
What type of packet filtering records session-specific information about a network connection,including the ports a client uses?
A) Stateful
B) Stateless
C) Static
D) Dynamic
A) Stateful
B) Stateless
C) Static
D) Dynamic
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck
28
What type of IDSs/IPSs monitors activity on network segments by sniffing traffic as it flows over the network and alerting a security administrator when something suspicious occurs?
A) Passive
B) Active
C) Network-based
D) Host-based
A) Passive
B) Active
C) Network-based
D) Host-based
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck
29
What router feature provides basic security by mapping internal private IP addresses to public external IP addresses,essentially hiding the internal infrastructure from unauthorized personnel?
A) Port
B) QoS
C) NAT
D) AES
A) Port
B) QoS
C) NAT
D) AES
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck
30
What specific type of tools can assist teams by identifying attacks and indicators of compromise by collecting,aggregating,and correlating log and alert data from routers,firewalls,IDS/IPS,endpoint logs,Web filtering devices,and other security tools?
A) IOS
B) DMZ
C) IDS
D) SIEM
A) IOS
B) DMZ
C) IDS
D) SIEM
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck
31
Which of the following is a computer placed on the network perimeter with the main goal of distracting hackers from attacking legitimate network resources?
A) IDS
B) router
C) honeypot
D) firewall
A) IDS
B) router
C) honeypot
D) firewall
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck
32
What type of function is being performed when a router screens packets based on information in the packet header?
A) packet filtering
B) packet scanning
C) router screening
D) IP filtering
A) packet filtering
B) packet scanning
C) router screening
D) IP filtering
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck
33
Which type of Cisco access lists can restrict IP traffic entering or leaving a router's interface based only on the source IP address?
A) Standard IP
B) Extended IP
C) IP restrict
D) ACL IP
A) Standard IP
B) Extended IP
C) IP restrict
D) ACL IP
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck
34
When Web site visitors are involved in downloading malicious code without their knowledge,they may be unknowingly involved in what type of process?
A) drive-by download
B) Web download attack
C) Web filtering
D) download filtering
A) drive-by download
B) Web download attack
C) Web filtering
D) download filtering
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck
35
Routers operate at the Network layer of the TCP/IP protocol stack.
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck
36
Which type of device monitors a network's hardware so that security administrators can identify attacks in progress and stop them?
A) Firewall
B) DMZ
C) Router
D) IDS
A) Firewall
B) DMZ
C) Router
D) IDS
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck
37
What type of an IDS is being used when it does not take any action to stop or prevent an activity occurring?
A) dormant system
B) nondynamic system
C) passive system
D) active system
A) dormant system
B) nondynamic system
C) passive system
D) active system
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck
38
What type of IDS/IPS is used to protect a critical network server or database server by installing the IDS or IPS software on the system you're attempting to protect?
A) Passive
B) Active
C) Network-based
D) Host-based
A) Passive
B) Active
C) Network-based
D) Host-based
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck
39
Which IDS system uses a baseline of normal activity and then sends an alert if the activity deviates significantly from this baseline?
A) System-based IDS
B) Anomaly-based IDS
C) Host-based IDS
D) Network-based IDS
A) System-based IDS
B) Anomaly-based IDS
C) Host-based IDS
D) Network-based IDS
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck
40
Which of the following sits between the Internet and the internal network and is sometimes referred to as a perimeter network?
A) firewall
B) DMZ
C) honeypot
D) IDS
A) firewall
B) DMZ
C) honeypot
D) IDS
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck
41
Match each item with a statement below.a.stateful packet filter
b.passive systems
c.NAT
d.DMZ
e.stateless packet filter
f.user mode
g.privileged mode
h.indicators of compromise
i.active systems
j.application-aware firewall
Handle each packet separately and are not resistant to spoofing or DoS attacks
b.passive systems
c.NAT
d.DMZ
e.stateless packet filter
f.user mode
g.privileged mode
h.indicators of compromise
i.active systems
j.application-aware firewall
Handle each packet separately and are not resistant to spoofing or DoS attacks
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck
42
Match each item with a statement below.a.stateful packet filter
b.passive systems
c.NAT
d.DMZ
e.stateless packet filter
f.user mode
g.privileged mode
h.indicators of compromise
i.active systems
j.application-aware firewall
Small network containing resources that a company wants to make available to Internet users and helps maintain security
b.passive systems
c.NAT
d.DMZ
e.stateless packet filter
f.user mode
g.privileged mode
h.indicators of compromise
i.active systems
j.application-aware firewall
Small network containing resources that a company wants to make available to Internet users and helps maintain security
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck
43
Match each item with a statement below.a.stateful packet filter
b.passive systems
c.NAT
d.DMZ
e.stateless packet filter
f.user mode
g.privileged mode
h.indicators of compromise
i.active systems
j.application-aware firewall
Inspects network traffic at a higher level in the OSI model than a traditional stateful packet inspection
b.passive systems
c.NAT
d.DMZ
e.stateless packet filter
f.user mode
g.privileged mode
h.indicators of compromise
i.active systems
j.application-aware firewall
Inspects network traffic at a higher level in the OSI model than a traditional stateful packet inspection
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck
44
How do "Network-based IDSs/IPSs" monitor activity on network segments?
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck
45
List the different types of memory and their main function found in Cisco routers?
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck
46
Match each item with a statement below.a.stateful packet filter
b.passive systems
c.NAT
d.DMZ
e.stateless packet filter
f.user mode
g.privileged mode
h.indicators of compromise
i.active systems
j.application-aware firewall
IDS systems that don't take any action to stop or prevent an activity
b.passive systems
c.NAT
d.DMZ
e.stateless packet filter
f.user mode
g.privileged mode
h.indicators of compromise
i.active systems
j.application-aware firewall
IDS systems that don't take any action to stop or prevent an activity
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck
47
What are the advantages and disadvantages of hardware and software firewalls?
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck
48
Match each item with a statement below.a.stateful packet filter
b.passive systems
c.NAT
d.DMZ
e.stateless packet filter
f.user mode
g.privileged mode
h.indicators of compromise
i.active systems
j.application-aware firewall
Administrator can perform full router configuration tasks
b.passive systems
c.NAT
d.DMZ
e.stateless packet filter
f.user mode
g.privileged mode
h.indicators of compromise
i.active systems
j.application-aware firewall
Administrator can perform full router configuration tasks
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck
49
What are the interfaces in a Cisco router?
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck
50
Match each item with a statement below.a.stateful packet filter
b.passive systems
c.NAT
d.DMZ
e.stateless packet filter
f.user mode
g.privileged mode
h.indicators of compromise
i.active systems
j.application-aware firewall
IDS systems log events and send alerts,but they can also interoperate with routers and firewalls to stop an attack
b.passive systems
c.NAT
d.DMZ
e.stateless packet filter
f.user mode
g.privileged mode
h.indicators of compromise
i.active systems
j.application-aware firewall
IDS systems log events and send alerts,but they can also interoperate with routers and firewalls to stop an attack
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck
51
Match each item with a statement below.a.stateful packet filter
b.passive systems
c.NAT
d.DMZ
e.stateless packet filter
f.user mode
g.privileged mode
h.indicators of compromise
i.active systems
j.application-aware firewall
Internal private IP addresses are mapped to public external IP addresses hiding the internal infrastructure
b.passive systems
c.NAT
d.DMZ
e.stateless packet filter
f.user mode
g.privileged mode
h.indicators of compromise
i.active systems
j.application-aware firewall
Internal private IP addresses are mapped to public external IP addresses hiding the internal infrastructure
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck
52
Match each item with a statement below.a.stateful packet filter
b.passive systems
c.NAT
d.DMZ
e.stateless packet filter
f.user mode
g.privileged mode
h.indicators of compromise
i.active systems
j.application-aware firewall
Records session-specific information about a network connection
b.passive systems
c.NAT
d.DMZ
e.stateless packet filter
f.user mode
g.privileged mode
h.indicators of compromise
i.active systems
j.application-aware firewall
Records session-specific information about a network connection
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck
53
What is a path-vector routing protocol?
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck
54
What is a link-state routing protocol?
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck
55
Match each item with a statement below.a.stateful packet filter
b.passive systems
c.NAT
d.DMZ
e.stateless packet filter
f.user mode
g.privileged mode
h.indicators of compromise
i.active systems
j.application-aware firewall
Administrator can perform basic troubleshooting tests and list information stored on the router
b.passive systems
c.NAT
d.DMZ
e.stateless packet filter
f.user mode
g.privileged mode
h.indicators of compromise
i.active systems
j.application-aware firewall
Administrator can perform basic troubleshooting tests and list information stored on the router
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck
56
What is a distance-vector routing protocol?
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck
57
What is the purpose of creating a "Security Operations Center"?
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck
58
What is the difference between passive and active IDSs?
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck
59
Match each item with a statement below.a.stateful packet filter
b.passive systems
c.NAT
d.DMZ
e.stateless packet filter
f.user mode
g.privileged mode
h.indicators of compromise
i.active systems
j.application-aware firewall
Indicates that a system or network has been hacked
b.passive systems
c.NAT
d.DMZ
e.stateless packet filter
f.user mode
g.privileged mode
h.indicators of compromise
i.active systems
j.application-aware firewall
Indicates that a system or network has been hacked
Unlock Deck
Unlock for access to all 59 flashcards in this deck.
Unlock Deck
k this deck