This type of firewall configuration uses a "DMZ" to increase security
This IPSec mode is used for host-to-host connections
Transport Mode
This type of VPN is used for a mobile user looking to connect to secure materials remotely
Remote Access
This type of attack attempts to shutdown a network, computer, or process.
DoS
This Information source in terms of IDS operate on information collected within the computer system
Host based IDS
This type of host performs authentication and proxy functions
Bastion Host
This SA parameter allows the destination to select the correct SA under which the received packet will be processed
Security Parameters Index
This VPN setup the end host uses software to connect to VPN
End host to gateway
This type of attacker has the ability to send packets to a machine over a network
Remote to Login
This type of IPSec mode encrypts the original IP header
Tunnel Mode
This mechanism to in Packet-Filtering Routers is used when you want packet-by-packet detection
Stateless Filter
This traffic security protocol protects IP Headers as well as the higher layer payload
Authentication Header
This part of IKE negotiates IPSec SA parameters
Phase 2
This type of intruder is a legitimate user who accesses resources for which he is not authorized, or authorized but misuses his privileges
Misfeasor
This type of firewall has the advantage of powerful logging features
Application-level Gateway
This Firewall selection recommendation provides password-level protection for remote users
This technique is used to conceal actual length of payload
Padding
This mechanism helps with clogging attacks
Cookie
This component of the IDS model sends alerts to the Manager
Analyzer
This type of ruled based detection detect unusual usage from normal usage patterns
Anomaly Detection
This Firewall characteristic determines the types of Internet services that can be accessed, inbound or outbound
Service control
This service uses a fixed window size to know which packets to discard and which to accept
Anti-Replay service
This implementation of IPSec is underneath an exisiting implementation of the IP Stack
Bump-in-the-stack
This principle states the following: Systems should remain secure even when the attacker knows all internal details of the system
Kerkhoff's
This type of Firewall selection changes the source address of all traffic leaving your network, preventing hackers from IP spoofing.
FW must contain NAT