Deck 13: Network Protection Systems
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
Play
Full screen (f)
Deck 13: Network Protection Systems
1
A honeypot appears to have important data or sensitive information stored on it.
True
2
To see the contents of flash memory and the amount of memory used and available, a Cisco administrator would type this command: ____.
A)show running-config
B)show startup-config
C)show flash
D)show ip route
A)show running-config
B)show startup-config
C)show flash
D)show ip route
C
3
To see the contents of NVRAM, a Cisco administrator would type this command: ____.
A)show running-config
B)show startup-config
C)show flash
D)show ip route
A)show running-config
B)show startup-config
C)show flash
D)show ip route
B
4
____ IDSs/IPSs monitor activity on network segments. Essentially, they sniff traffic as it flows over the network and alert a security administrator when something suspicious occurs.
A)Passive
B)Active
C)Network-based
D)Host-based
A)Passive
B)Active
C)Network-based
D)Host-based
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
____ access lists can restrict IP traffic entering or leaving a router's interface based on only one criterion: source IP address.
A)Standard IP
B)Extended IP
C)IPX
D)Access control
A)Standard IP
B)Extended IP
C)IPX
D)Access control
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
A(n) ____ sits between the Internet and the internal network and is sometimes referred to as a "perimeter network."
A)firewall
B)DMZ
C)honeypot
D)IDS
A)firewall
B)DMZ
C)honeypot
D)IDS
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
The ____ of a Cisco router contains a minimal version of the IOS used to boot the router if flash memory gets corrupted.
A)RAM
B)NVRAM
C)flash memory
D)ROM
A)RAM
B)NVRAM
C)flash memory
D)ROM
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
A security appliance is a single device combining two or more network protection functions.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
The main purpose of a(n) ____ is to reduce broadcast traffic that passes over a network and to choose the best path for moving those packets.
A)firewall
B)IDS
C)honeypot
D)router
A)firewall
B)IDS
C)honeypot
D)router
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
To see what information is stored in RAM, a Cisco administrator would type this command: ____.
A)show running-config
B)show startup-config
C)show flash
D)show ip route
A)show running-config
B)show startup-config
C)show flash
D)show ip route
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
Routers operate at the data link layer of the OSI model.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
The ____ of a Cisco router holds the router's configuration file, but the information is not lost if the router is turned off.
A)RAM
B)NVRAM
C)flash memory
D)ROM
A)RAM
B)NVRAM
C)flash memory
D)ROM
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
____ monitor network devices so that security administrators can identify attacks in progress and stop them.
A)Firewalls
B)DMZs
C)Honeypots
D)IDSs
A)Firewalls
B)DMZs
C)Honeypots
D)IDSs
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
The ____ of a Cisco router holds the router's running configuration, routing tables, and buffers; this information is lost if the router is turned off.
A)RAM
B)NVRAM
C)flash memory
D)ROM
A)RAM
B)NVRAM
C)flash memory
D)ROM
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
To see the router's routing table, a Cisco administrator would type this command: ____.
A)show running-config
B)show startup-config
C)show interfaces
D)show ip route
A)show running-config
B)show startup-config
C)show interfaces
D)show ip route
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
When first logging on to a Cisco router, you're in user mode by default.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
A standard IP access list is restricted to source IP addresses.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
____ IDSs/IPSs are used to protect a critical network server or database server. The software is installed on the server you're attempting to protect, just like antivirus software you install on your desktop system.
A)Passive
B)Active
C)Network-based
D)Host-based
A)Passive
B)Active
C)Network-based
D)Host-based
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
Stateless packet filters recognize types of anomalies that most routers ignore, such as hundreds or thousands of SYN/ACK packets being sent to a computer or server, even though the computer or server hasn't sent out any SYN packets
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
The ____ of a Cisco router holds the IOS the router is using.
A)RAM
B)NVRAM
C)flash memory
D)ROM
A)RAM
B)NVRAM
C)flash memory
D)ROM
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
MATCHING
Match each term with the correct statement below.
a.stateful packet filter
f.user mode
b.firewall
g.enable mode
c.NAT
h.ASA
d.DMZ
i.privileged mode
e.stateless packet filter
serves two purposes: controlling access to all traffic that enters an internal network, and controlling all traffic that leaves an internal network
Match each term with the correct statement below.
a.stateful packet filter
f.user mode
b.firewall
g.enable mode
c.NAT
h.ASA
d.DMZ
i.privileged mode
e.stateless packet filter
serves two purposes: controlling access to all traffic that enters an internal network, and controlling all traffic that leaves an internal network
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
A Cisco router uses the Cisco _________________________ System (IOS) to function.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
____ runs hacker-enticing services and written and documented in Portuguese, but the easy-to-use graphical interface makes up for any time spent translating.
A)Valhala
B)Honeyd
C)Nepenthes
D)SANS Internet Storm Center
A)Valhala
B)Honeyd
C)Nepenthes
D)SANS Internet Storm Center
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
____, written in C for *nix platforms, is an open-source virtual honeypot created and maintained by Niels Provos.
A)Decoy Server
B)NetBait
C)Tiny Honeypot
D)Honeyd
A)Decoy Server
B)NetBait
C)Tiny Honeypot
D)Honeyd
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
MATCHING
Match each term with the correct statement below.
a.stateful packet filter
f.user mode
b.firewall
g.enable mode
c.NAT
h.ASA
d.DMZ
i.privileged mode
e.stateless packet filter
internal private IP addresses are mapped to public external IP addresses
Match each term with the correct statement below.
a.stateful packet filter
f.user mode
b.firewall
g.enable mode
c.NAT
h.ASA
d.DMZ
i.privileged mode
e.stateless packet filter
internal private IP addresses are mapped to public external IP addresses
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
____ is a Windows-based honeypot that emulates thousands of fake services and enables administrators to track and analyze an intruder's activity.
A)Decoy Server
B)NetBait
C)Jackpot
D)Honeyd
A)Decoy Server
B)NetBait
C)Jackpot
D)Honeyd
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
MATCHING
Match each term with the correct statement below.
a.stateful packet filter
f.user mode
b.firewall
g.enable mode
c.NAT
h.ASA
d.DMZ
i.privileged mode
e.stateless packet filter
handles each packet on an individual basis and are not resistant to spoofing or DoS attacks
Match each term with the correct statement below.
a.stateful packet filter
f.user mode
b.firewall
g.enable mode
c.NAT
h.ASA
d.DMZ
i.privileged mode
e.stateless packet filter
handles each packet on an individual basis and are not resistant to spoofing or DoS attacks
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
____ is a PHP-based honeypot that can be installed on any Apache Web Server system with PHP.
A)Decoy Server
B)NetBait
C)SANS Internet Storm Center
D)Honeyd
A)Decoy Server
B)NetBait
C)SANS Internet Storm Center
D)Honeyd
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
MATCHING
Match each term with the correct statement below.
a.stateful packet filter
f.user mode
b.firewall
g.enable mode
c.NAT
h.ASA
d.DMZ
i.privileged mode
e.stateless packet filter
small network containing resources that a company wants to make available to Internet users
Match each term with the correct statement below.
a.stateful packet filter
f.user mode
b.firewall
g.enable mode
c.NAT
h.ASA
d.DMZ
i.privileged mode
e.stateless packet filter
small network containing resources that a company wants to make available to Internet users
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
MATCHING
Match each term with the correct statement below.
a.stateful packet filter
f.user mode
b.firewall
g.enable mode
c.NAT
h.ASA
d.DMZ
i.privileged mode
e.stateless packet filter
records session-specific information about a network connection
Match each term with the correct statement below.
a.stateful packet filter
f.user mode
b.firewall
g.enable mode
c.NAT
h.ASA
d.DMZ
i.privileged mode
e.stateless packet filter
records session-specific information about a network connection
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
MATCHING
Match each term with the correct statement below.
a.stateful packet filter
f.user mode
b.firewall
g.enable mode
c.NAT
h.ASA
d.DMZ
i.privileged mode
e.stateless packet filter
also called privileged mode
Match each term with the correct statement below.
a.stateful packet filter
f.user mode
b.firewall
g.enable mode
c.NAT
h.ASA
d.DMZ
i.privileged mode
e.stateless packet filter
also called privileged mode
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
A(n) ____________________ is a computer placed on the perimeter of a network that contains information or data intended to lure and then trap hackers.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
____ is an open-source network-based IDS.
A)NetRanger
B)Snort
C)Aladdin
D)Entercept
A)NetRanger
B)Snort
C)Aladdin
D)Entercept
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
One goal of a(n) ____ is to have hackers connect to the "phony" computer long enough to be traced.
A)IDS
B)router
C)honeypot
D)firewall
A)IDS
B)router
C)honeypot
D)firewall
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
____________________ honeypots are created by using a programming language rather than configuring a physical device.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
____________________ are hardware devices used on a network to send packets to different network segments.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
MATCHING
Match each term with the correct statement below.
a.stateful packet filter
f.user mode
b.firewall
g.enable mode
c.NAT
h.ASA
d.DMZ
i.privileged mode
e.stateless packet filter
allows an administrator to perform full router configuration tasks
Match each term with the correct statement below.
a.stateful packet filter
f.user mode
b.firewall
g.enable mode
c.NAT
h.ASA
d.DMZ
i.privileged mode
e.stateless packet filter
allows an administrator to perform full router configuration tasks
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
MATCHING
Match each term with the correct statement below.
a.stateful packet filter
f.user mode
b.firewall
g.enable mode
c.NAT
h.ASA
d.DMZ
i.privileged mode
e.stateless packet filter
replaced the Cisco PIX firewall and added advanced modular features
Match each term with the correct statement below.
a.stateful packet filter
f.user mode
b.firewall
g.enable mode
c.NAT
h.ASA
d.DMZ
i.privileged mode
e.stateless packet filter
replaced the Cisco PIX firewall and added advanced modular features
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
Some organizations need a permanent team whose members are responsible solely for security-response functions, known as a(n) ________________________________________.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
MATCHING
Match each term with the correct statement below.
a.stateful packet filter
f.user mode
b.firewall
g.enable mode
c.NAT
h.ASA
d.DMZ
i.privileged mode
e.stateless packet filter
allows an administrator to perform basic troubleshooting tests and list information stored on the router
Match each term with the correct statement below.
a.stateful packet filter
f.user mode
b.firewall
g.enable mode
c.NAT
h.ASA
d.DMZ
i.privileged mode
e.stateless packet filter
allows an administrator to perform basic troubleshooting tests and list information stored on the router
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
What is the difference between passive and active IDSs?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
What is the purpose of the read-only memory in a Cisco router?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
What is honeyd? How does it work?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
How do you know what mode a Cisco router is in?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
What is a link-state routing protocol?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
What are the advantages and disadvantages of hardware and software firewalls?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
What is a path-vector routing protocol?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
What is a distance-vector routing protocol?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
List the components of a Cisco router.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
What are the interfaces in a Cisco router?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck