Upgrade to remove ads
Ethical Hacking and Network Security - Ch 13 - Network Protection Systems
Get Quizlet's official A+ Core 2 - 1 term, 1 practice question, 1 full practice test
Key Terms chapter 13
Terms in this set (25)
An IDS or IPS that logs events, sends out alerts, and can interoperate with routers and firewalls.
A type of IDS that sends alerts on network traffic varying from a set baseline.
A firewall that inspects network traffic at a higher level in the OSI model than a traditional stateful packet inspection firewall does.
demilitarized zone (DMZ)
A small network containing resources that sits between the Internet and the internal network, sometimes referred to as a "perimeter network." It's used when a company wants to make resources available to Internet users yet keep the company's internal network secure.
distance-vector routing protocol
A routing protocol that passes the routing table (containing all possible paths) to all routers on the network. If a router learns one new path, it sends the entire routing table again, which isn't as efficient as a link-state routing protocol.
A type of attack in which Web site visitors download and install malicious code or software without their knowledge.
Hardware devices or software used to control traffic entering and leaving an internal network.
A computer placed on the network perimeter that contains information or data intended to lure hackers and distract them from legitimate network resources.
Software used to protect a critical network server or database server. The software is installed on the system you're attempting to protect, just like installing antivirus software on a desktop system.
intrusion detection systems (IDSs)
Hardware or software devices that monitor network traffic and send alerts so that security administrators can identify attacks in progress and stop them.
intrusion prevention systems (IPSs)
Network-based or host-based devices or software that go beyond monitoring traffic and sending alerts to actually block malicious activity they detect.
IP access lists
A list of IP addresses, subnets, or networks that are allowed or denied access through a router's interface.
link-state routing protocol
A routing protocol that uses link-state advertisements to send topology changes or new paths to other routers on the network. This method is efficient because only new information is sent, not the entire routing table.
Network Address Translation (NAT)
A basic security feature of a firewall used to hide the internal network from outsiders. Internal private IP addresses are mapped to public external IP addresses to hide the internal infrastructure from unauthorized personnel.
Devices that monitor traffic on network segments and alert security administrators of suspicious activity.
network protection system
Any system designed specifically to protect networks or network devices from attacks; includes routers, firewalls, Web filters, network-based and host-based IPSs and IDSs, and honeypots.
IDSs that don't take any action to stop or prevent a security event.
path-vector routing protocol
A protocol that uses dynamically updated paths or routing tables to transmit packets from one autonomous network to another.
A mode on Cisco routers that allows administrators to perform full router configuration tasks; also called enable mode.
A device that combines multiple network protection functions, such as those performed by a router, a firewall, and an IPS, on the same piece of hardware.
security incident response team (SIRT)
A team of security professionals with the main responsibility of responding to network attacks and security events.
stateful packet filters
Filters on routers that record session-specific information in a file about network connections, including the ports a client uses.
stateless packet filters
Filters on routers that handle each packet separately, so they aren't resistant to spoofing or DoS attacks.
A file created by a stateful packet filter that contains information on network connections. See also stateful packet filters.
The default method on a Cisco router, used to perform basic troubleshooting tests and list information stored on the router. In this mode, no changes can be made to the router's configuration.
This set is often in folders with...
Hands on Ethical Hacking and Network Defense Ch7 P…
Hands on Ethical Hacking and Network Defense Ch8 D…
Hands on Ethical Hacking and Network Defense Ch10…
Hands on Ethical Hacking and Network Defense Ch 11…
You might also like...
Hands-On Ethical Hacking and Network Defense - Ch.…
Security+ Chapter 8: Securing Networks
Networking + Chapter 1
Other sets by this creator
EXAM 70-687 Configuring Windows 8 - Lesson 18
EXAM 70-687 Configuring Windows 8 - Lesson 17
Ethical Hacking and Security - Chapter 12 - Crypto…
A+ Guide to Hardware Chapter 4
Other Quizlet sets
Chapter 8.1,2,3,8 Chris S.
BUS 401 Final
Ch.7 Administering a Secure Network
Security Vocab Part 2