COMPLETE QUESTIONS AND CORRECT
ANSWERS
◉network segmentation. Answer: The act of dividing a network into
multiple smaller networks, each acting as its own small network
(subnet)
◉choke points. Answer: certain points in the network, such as
routers, firewalls, or proxies, where we can inspect, filter, and
control network traffic
◉redundancy. Answer: a method of security that involves designing
a network to always have another route if something fails or loses
connection
◉firewall. Answer: a mechanism for maintaining control over the
traffic that flows into and out of our networks
◉packet filtering. Answer: A firewall technology that inspects the
contents of each packet in network traffic individually and makes a
gross determination (based on source and destination IP address,
,port number, and the protocol being used) of whether the traffic
should be allowed to pass
◉SPI (Stateful Packet Inspection). Answer: a firewall that can watch
packets and monitor the traffic from a given connection
◉DPI (Deep Packet Inspection). Answer: a firewall technology that
can analyze the actual content of the traffic that is flowing through
◉proxy server. Answer: a specialized type of firewall that can serve
as a choke point, log traffic for later inspection, and provides a layer
of security by serving as a single source of requests for the devices
behind it
◉DMZ (demilitarized zone). Answer: a combination of a network
design feature and a protective device such as a firewall.
Often used for systems that need to be exposed to external networks
but are connected to our own network (such as a web server)
◉NIDS (Network intrusion detection system). Answer: A system
that monitors network traffic and alerts for unauthorized activity
◉signature-based IDS. Answer: An IDS that maintains a database of
signatures that might signal a particular type of attack and compares
incoming traffic to those signatures
,◉anomaly-based IDS. Answer: an IDS that takes a baseline of normal
network traffic and activity and measures current traffic against this
baseline to detect unusual events
◉VPN (Virtual Private Network). Answer: an encrypted connection
between two points
◉SSH (Secure Shell). Answer: protocol used to secure traffic in a
variety of ways, including file transfers and terminal access. uses
RSA encryption (asymmetric encryption)
◉BYOD (bring your own device). Answer: a phrase that refers to an
organization's strategy and policies regarding the use of personal vs.
corporate devices
◉MDM (mobile device management). Answer: a solution that
manages security elements for mobile devices in the workplace
◉kismet. Answer: a well-known Linux sniffing tool used to detect
wireless access points
◉NetStumbler. Answer: A Windows tool used to detect wireless
access points
, ◉nmap. Answer: A well-known port scanner that can also search for
hosts on a network, identify the operating systems those hosts are
running, detect the version of the services running on any open
ports, and more
◉packet sniffer (aka network or protocol analyzer). Answer: this
type of tool can intercept traffic on a network;
listens for any traffic that the network interface of our computer or
device can see
◉tcpdump (WinDump for Windows). Answer: classic, command-
line sniffing tool that monitors network activities, filters traffic, and
more
runs on UNIX systems
◉Wireshark. Answer: a graphical interface protocol sniffing tool that
is capable of filtering, sorting, & analyzing both wired and wireless
traffic
- popular troubleshooting tool
◉honeypot. Answer: A type of tool that deliberately displays
vulnerabilities or attractive data so it can detect, monitor, and
sometimes tamper with the activities of an attacker