DMZ
Demilitarized zone
A network segment between two firewalls.
DMZ
A periodic update that corrects problems in one version of a product is called a(n) __________.
A. Hotfix
B. Overhaul
C. Service pack
D. Security update
Service pack
Is an area where you can place a public server for access by people whom you might not trust otherwise
Typically between 2 firewalls
A demilitarized zone (DMZ)
IDS
Intrusion detection system
A network that functions in the same manner as a honeypot
honeynet
Which device monitors network traffic in a passive manner?
IDS
Allows an outside entity access to a part of your internal network.
Extranet
IPS
Intrusion prevention system
A fake system designed to divert attackers from your real systems
honeypot
What is a system that is intended or designed to be broken into by an attacker?
Honeypot
Accessible only within the organization’s network.
Intranet
PII
Personally identifiable information
A system that monitors the network for possible intrusions and logs that activity.
Intrusion detection system (IDS)
In intrusion detection system vernacular, which account is responsible for setting the security policy for an organization?
A. Supervisor
B. Administrator
C. Root
D. Director
Administrator
Most trusted wireless security protocol
WPA2
ISO
International Organization for Standardization
A system that monitors the network for possible intrusions and logs that activity and then blocks the traffic that is suspected of being an attack.
Intrusion prevention system (IPS)
You are a junior security administrator for a large bank. You have been asked to make the database servers as secure as they can be. The process of making certain that an entity (operating system, application, and so on) is as secure as it can be is known as which of the following?
A. Stabilizing
B. Reinforcing
C. Hardening
D. Toughening
Hardening
Occurs when one or more systems are literally not connected to a network.
air-gap.
NIST
National Institute of Standards and Technology
Any information that could identify a particular individual.
Personally identifiable information (PII)
John is working on designing a network for the insurance company where he is employed. He wants to put the web server in an area that has somewhat less security so that outside users might access it. But he does not want that to compromise the security of the rest of the network. What would be John’s best approach?
A. Place the web server in a honeynet.
B. Place the web server on the guest network segment.
C. Place the web server in a DMZ.
D. Place the web server outside his network.
Place the web server in a DMZ.
A private network connection that occurs through a public network.
A virtual private network (VPN)
PCI-DSS
Payment Card Industry Data Security Standard
A firewall that not only examines each packet but also remembers the recent previous packets.
Stateful packet inspection (SPI)
You are concerned about your backup files becoming infected with malware. Which of the following technologies would be best to protect your backup?
A. Air-gap
B. SPI firewall
C. DMZ
D. VLAN
Air-gap
One of the first lines of defense in a network
Firewalls