Risky Business
Securing your network
Performance and Recovery
Mish mash
random stuff
100

This describes the weakness of a system that could lead to compromised information or unauthorized access

What is a vulnerability?

100

This can capture all traffic traversing a network connection.

What is a TAP (test access point)?

100

This app is used to create flow records that show relationships among various traffic types

What is NetFlow?

100

This is the logical group of Windows Servers controlling the network access to a group of computers

What is a domain?

100

This is a distinct network of storage devices that communicate directly with each other and with other portions of the network

What is a Storage Area Network (SAN)?

200

This isa popular penetration testing tool that combines known scanning and exploit techniques to explore potentially new attack routes.

What is metasploit?

200

Which firewall protects the computer on which it is installed

What is a host-based firewall?

200

This is used to monitors traffic at a specific interface between a server or client and the network

What is a protocol analyzer?

200

This is the maximum allowable distance for horizontal cabling.

What is 100m/328ft?

200

This is where a wireless signal is split into secondary waves upon encountering an obstruction

What is diffraction?

300

This provides a tracking system that is used by vulnerability databases

What is CVE (Common Vulnerabilities and Exposures)?

300

This is a device or application that stores or generates information known only to its authorized user.

What is a security token?

300

This is a bandwidth management technique that adjusts the way network devices respond to indications of network performance issues caused by traffic congestion throughout a network.

What is Congestion control?

300

This is the range of Well-known ports.

What is 0-1023?

300

The average amount of time required to repair a device is known by this measurement.

What is MTTR (mean time to repair)?

400

This tool is designed to scan large networks quickly and provide information about a network and its hosts

What is NMAP?

400

This monitoring alerts the system of any changes made to files that shouldn't change, such as operating system files

What is file integrity monitoring (FIM)?

400

Which CLI tool will let you measure the throughput between network hosts?

What is IPERF?

400

This transport protocol is used for small requests, such as DNS.

What is UDP?

400

This feature is characterized by a single switch  supporting traffic belonging to several VLANs across a network

What is VLAN Trunking?

500

This is a decoy system that is purposely vulnerable and filled with what appears to be sensitive (though false) content

What is a honeypot?

500

This device stands in-line between the attacker and the targeted network or host where it can prevent traffic from reaching that network or host

What is an IPS?

500

This backup strategy backs up only the data that has changed since the last backup?

What is an incremental backup?

500

This type of signal may travel in only one direction.

What is simplex?

500

This can be configured to follow policies that might avoid a certain router or instruct a group of routers to prefer one route over other available routes.

What is border gateway protocol?