Deck 21: Network Endpoint Security

Full screen (f)
exit full mode
Question
Intrusion detection is the process of collecting information about
events occurring in a computer system or network and analyzing them for signs of intrusions.
Use Space or
up arrow
down arrow
to flip the card.
Question
One limitation of a firewall is that an improperly secured wireless
LAN may be accessed from outside the organization.
Question
the primary benefit of a host-based IDS is that it can detect both
external and internal intrusions.
Question
Packet filter firewalls are susceptible to security breaches caused
by improper configurations.
Question
the __________ defines the transport protocol.

A)interface
B)IP protocol field
C)source IP address
D)destination IP address
Question
typically, a _________ is inserted between the premises network and the Internet to establish a controlled link and to erect an outer security wall or perimeter.

A)WAP
B)firewall
C)reflector
D)blocker
Question
A __________ provides a location for monitoring security-related events.

A)firewall
B)choke point
C)LAN
D)secured operating system
Question
the internal firewall provides a measure of access control and
protection for the DMZ systems consistent with their need for external connectivity.
Question
the firewall provides an additional layer of defense, insulating
internal systems from external networks or other parts of the internal network.
Question
__________ determines the direction in which particular service requests may be initiated and allowed to flow through the firewall.

A)Behavior control
B)Service control
C)Direction control
D)User control
Question
Analyzers are responsible for collecting dat
A.
Question
A circuit-level gateway permits an end-to-end tCP connection.
Question
the user control feature is typically applied to users outside the
firewall perimeter.
Question
Multiple internal firewalls can be used to protect portions of the
internal network from each other.
Question
__________ controls how particular services are used.

A)User control
B)Direction control
C)Service control
D)Behavior control
Question
A firewall may filter traffic on the basis of IP address, protocol, or
port number.
Question
Packet filter gateways tend to be more secure than application-
level gateways.
Question
A firewall may not act as a packet filter.
Question
the first step in a DDoS attack is for the attacker to infect a
number of machines with zombie software that will ultimately be
used to carry out the attack.
Question
A stateful packet inspection firewall reviews the same packet
information as a packet filtering firewall, but also records information about tCP connections.
Question
Between internal and external firewalls are one or more networked devices in a region referred to as a __________ network.

A)demilitarized zone
B)war zone
C)safe zone
D)protected zone
Question
the countermeasure for __________ is to discard packets with an inside source address if the packet arrives on an external interface.
Question
there are four techniques that firewalls use to control access and enforce the site's security policy: service control, direction control, user control, and __________ .
Question
__________ can more readily see the intended outcome of an attempted attack because they can directly access and monitor the data files and system processes usually targeted by attacks.

A)Host-based IDSs
B)External firewalls
C)User interfaces
D)Sensors
Question
A(n) __________ is placed at the edge of a local or enterprise network, just inside the boundary router that connects to the Internet or some wide area network.
Question
A(n) __________ is hardware or software products that gather and analyze information from various areas within a computer or a network for the purpose of finding, and providing real-time or near-real-time warning of, attempts to access system resources in an unauthorized manner.
Question
An application-level gateway, also called a(n) __________ , acts as a relay of application-level traffic.

A)application proxy
B)relay proxy
C)source proxy
D)program proxy
Question
Systems that are externally accessible but need some protections are usually located on _________ networks.

A)IDS
B)DMZ
C)DMARC
D)ISP
Question
A __________ monitors network traffic for particular network segments or devices and analyzes network, transport, and application protocols to identify suspicious activity.
Question
A __________ is a computer program that can copy itself and infect a computer without permission or knowledge of the user.

A)worm
B)virus
C)rootkit
D)trojan horse
Question
An __________ is violations of security policy, usually characterized as attempts to affect the confidentiality, integrity, or availability of a computer or network.

A)anomaly
B)IDS
C)intrusion
D)analyzer
Question
A __________ is an undocumented way of gaining access to a computer system.

A)backdoor
B)rootkit
C)bot
D)virus
Question
An IDS comprises three logical components: sensors, __________ , and user interface.
Question
A __________ attack can be defeated by enforcing a rule that the first fragment of a packet must contain a predefined minimum amount of the transport header.
Question
A typical use of __________ is a situation in which the system administrator trusts the internal users.

A)DMZ networks
B)firewalls
C)circuit-level gateways
D)IDSs
Question
Data collection, correlation, alerting, and reporting/compliance are all key elements of ___________ .

A)incident management
B)reflector DDoS
C)direct DDoS
D)malware
Question
the __________ to an IDS enables a user to view output from the system or
control the behavior of the system.
Question
A __________ firewall applies a set of rules to each incoming and outgoing IP packet and then forwards or discards the packet.
Question
__________ control determines the types of Internet services that can be accessed, inbound or outbound.
Question
A scanning strategy that uses information contained on an infected victim machine to find more hosts to scan is the __________ method.

A)random
B)hit list
C)topological
D)local subnet
Question
__________ is the identification, collection, examination, and analysis of data while preserving the integrity of the information and maintaining a strict chain of custody for the dat
A.
Question
there are two general approaches to intrusion detection: Misuse detection
and ___________ .
Question
A __________ attack attempts to consume the target's resources so that it
cannot provide service.
Question
Information security ___________ consists of processes for detecting,
reporting, assessing, responding to, dealing with, and learning from
information security incidents.
Question
Malicious software, commonly called __________ , is perhaps the most
significant security threat to organizations.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/45
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 21: Network Endpoint Security
1
Intrusion detection is the process of collecting information about
events occurring in a computer system or network and analyzing them for signs of intrusions.
True
2
One limitation of a firewall is that an improperly secured wireless
LAN may be accessed from outside the organization.
True
3
the primary benefit of a host-based IDS is that it can detect both
external and internal intrusions.
True
4
Packet filter firewalls are susceptible to security breaches caused
by improper configurations.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
5
the __________ defines the transport protocol.

A)interface
B)IP protocol field
C)source IP address
D)destination IP address
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
6
typically, a _________ is inserted between the premises network and the Internet to establish a controlled link and to erect an outer security wall or perimeter.

A)WAP
B)firewall
C)reflector
D)blocker
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
7
A __________ provides a location for monitoring security-related events.

A)firewall
B)choke point
C)LAN
D)secured operating system
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
8
the internal firewall provides a measure of access control and
protection for the DMZ systems consistent with their need for external connectivity.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
9
the firewall provides an additional layer of defense, insulating
internal systems from external networks or other parts of the internal network.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
10
__________ determines the direction in which particular service requests may be initiated and allowed to flow through the firewall.

A)Behavior control
B)Service control
C)Direction control
D)User control
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
11
Analyzers are responsible for collecting dat
A.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
12
A circuit-level gateway permits an end-to-end tCP connection.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
13
the user control feature is typically applied to users outside the
firewall perimeter.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
14
Multiple internal firewalls can be used to protect portions of the
internal network from each other.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
15
__________ controls how particular services are used.

A)User control
B)Direction control
C)Service control
D)Behavior control
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
16
A firewall may filter traffic on the basis of IP address, protocol, or
port number.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
17
Packet filter gateways tend to be more secure than application-
level gateways.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
18
A firewall may not act as a packet filter.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
19
the first step in a DDoS attack is for the attacker to infect a
number of machines with zombie software that will ultimately be
used to carry out the attack.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
20
A stateful packet inspection firewall reviews the same packet
information as a packet filtering firewall, but also records information about tCP connections.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
21
Between internal and external firewalls are one or more networked devices in a region referred to as a __________ network.

A)demilitarized zone
B)war zone
C)safe zone
D)protected zone
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
22
the countermeasure for __________ is to discard packets with an inside source address if the packet arrives on an external interface.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
23
there are four techniques that firewalls use to control access and enforce the site's security policy: service control, direction control, user control, and __________ .
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
24
__________ can more readily see the intended outcome of an attempted attack because they can directly access and monitor the data files and system processes usually targeted by attacks.

A)Host-based IDSs
B)External firewalls
C)User interfaces
D)Sensors
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
25
A(n) __________ is placed at the edge of a local or enterprise network, just inside the boundary router that connects to the Internet or some wide area network.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
26
A(n) __________ is hardware or software products that gather and analyze information from various areas within a computer or a network for the purpose of finding, and providing real-time or near-real-time warning of, attempts to access system resources in an unauthorized manner.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
27
An application-level gateway, also called a(n) __________ , acts as a relay of application-level traffic.

A)application proxy
B)relay proxy
C)source proxy
D)program proxy
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
28
Systems that are externally accessible but need some protections are usually located on _________ networks.

A)IDS
B)DMZ
C)DMARC
D)ISP
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
29
A __________ monitors network traffic for particular network segments or devices and analyzes network, transport, and application protocols to identify suspicious activity.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
30
A __________ is a computer program that can copy itself and infect a computer without permission or knowledge of the user.

A)worm
B)virus
C)rootkit
D)trojan horse
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
31
An __________ is violations of security policy, usually characterized as attempts to affect the confidentiality, integrity, or availability of a computer or network.

A)anomaly
B)IDS
C)intrusion
D)analyzer
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
32
A __________ is an undocumented way of gaining access to a computer system.

A)backdoor
B)rootkit
C)bot
D)virus
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
33
An IDS comprises three logical components: sensors, __________ , and user interface.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
34
A __________ attack can be defeated by enforcing a rule that the first fragment of a packet must contain a predefined minimum amount of the transport header.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
35
A typical use of __________ is a situation in which the system administrator trusts the internal users.

A)DMZ networks
B)firewalls
C)circuit-level gateways
D)IDSs
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
36
Data collection, correlation, alerting, and reporting/compliance are all key elements of ___________ .

A)incident management
B)reflector DDoS
C)direct DDoS
D)malware
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
37
the __________ to an IDS enables a user to view output from the system or
control the behavior of the system.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
38
A __________ firewall applies a set of rules to each incoming and outgoing IP packet and then forwards or discards the packet.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
39
__________ control determines the types of Internet services that can be accessed, inbound or outbound.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
40
A scanning strategy that uses information contained on an infected victim machine to find more hosts to scan is the __________ method.

A)random
B)hit list
C)topological
D)local subnet
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
41
__________ is the identification, collection, examination, and analysis of data while preserving the integrity of the information and maintaining a strict chain of custody for the dat
A.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
42
there are two general approaches to intrusion detection: Misuse detection
and ___________ .
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
43
A __________ attack attempts to consume the target's resources so that it
cannot provide service.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
44
Information security ___________ consists of processes for detecting,
reporting, assessing, responding to, dealing with, and learning from
information security incidents.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
45
Malicious software, commonly called __________ , is perhaps the most
significant security threat to organizations.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 45 flashcards in this deck.