Shared Flashcard Set

Details

Network Security Midterm
Network Security Midterm Cards (only ones I got wrong)
28
Computer Networking
Undergraduate 3
10/28/2009

Additional Computer Networking Flashcards

 


 

Cards

Term
Often devices most vulnerable to attack are those that provide services to inside users
Definition
false
Term
In a company of 500 employees it is estimated that ____ employees would be required to combat a virus attack
Definition
5
Term
A _________ virus can interrupt almost any function executed by the computer operating system and alter it for it's own malicious purposes
Definition
resident
Term
_________ is an image spam that is divided into multiple images
Definition
GIF layering
Term
_________ is a means of managing and presenting computer resources by function without regard to their physical layout or location
Definition
Virtualization
Term
The goal of _____ is to make it harder to predict where the operating system functionality resides in the memory
Definition
ASLR
Term
The _____ _____ are operating system settings that impose how the policy will be enforced
Definition
configuration baselines
Term
BitTorrent maximizes the transfer speed by gathering pieces of the file and downloading these pieces simulataneously from users who already have them (the collective pieces are called a _____)
Definition
swarm
Term
_____ allows the administrator to configure a switch to redirect traffic that occurs on some or all ports to a designated monitoring port on the switch
Definition
port mirroring
Term
smurf attack
Definition
DDOS with ICMP ping
Term
What type of attack makes a copy of data before sending it on to the intended host?
Definition
replay attack
Term
Substituting fraudulent IP address by targeting external dns server
Definition
DNS poisoning
Term
DNS poisoning can be prevented by using the latest editions of the DNS software, _____
Definition
BIND
Term
An attacker could alter the MAC address in the ARP cache so that the corresponding IP address would point to a different computer, which is known as _____
Definition
ARP Poisoning
Term
_____ enables the attacker's computer to forward any network traffic it receives from Computer A to the actual router
Definition
IP forwarding
Term
_____ examines the current state of a system or network device before it is allowed to connect to the network
Definition
NAC
Term
_____ honeypots are mainly used by organizations to capture limited information regarding attacks on that organization's honeypot.
Definition
Production
Term
An _____ finds malicious traffic and deals with it immediately
Definition
IPS
Term
A _____ is an instruction that interrupts the program being executed and requests a service from the operating system
Definition
System call
Term
_____ work to protect the entire network and all devices that are connected to it
Definition
NIPS
Term
_____ are designed to inspect traffic, and based on their configuration or security policy, they can drop maliciuos traffic
Definition
NIPS
Term
_____ can fully decode application layer network protocols. Once these protocols are decoded, the different parts of the protocol can be analyzed for any suspicious behavior.
Definition
Protocol Analyzers
Term
At regular intervals a wireless AP sends a beacon frame to announce its presence and to provide the necessary information for devices that want to join the network. This process is known as _____
Definition
Beaconing
Term
Mobile devices constantly survey the radio frequencies at regular intervals to determine if a different AP can provide better service. If it finds one, then the device automatically attempts to associate with the new AP (this process is called _____)
Definition
a handoff
Term
Encryption under the WPA2 personal security model is accomplished by _____
Definition
AES-CCMP
Term
SAN can be shared between servers but cannot be extended over geographical distances
Definition
False
Term
Because NAS operates at the file system level, NAS security cannot be implemented through the standard operating system features
Definition
False
Term
Signed Java applets by default run in the sandbox and are restricted regarding what they can do?
Definition
False, they are trusted and run outside the sandbox
Supporting users have an ad free experience!