Endpoint Security Concepts Training Exam Tested Questions With Revised Correct Detailed Answers >Latest Update>>
0 view 0 purchase
Course
EDR
Institution
EDR
Endpoint Security Concepts
Training Exam Tested Questions
With Revised Correct Detailed
Answers
>Latest Update>>
1. What's purpose is to enforce a set of network security policies across
network connections? - ANSWER
Firewall
2. What defines the rules of what traffic i...
Endpoint Security Concepts
Training Exam Tested Questions
With Revised Correct Detailed
Answers
>Latest Update>>
1. What's purpose is to enforce a set of network security policies across
network connections? - ANSWER Firewall
2. What defines the rules of what traffic is permissible and what traffic is to be
blocked or denied? - ANSWER Security policies
3. What is NAT? - ANSWER Network address translation. Allows outside
entities to communicate with an entity inside the firewall without truly
knowing it's address.
4. What is stateful filtering? - ANSWER A firewall knows and maintains
the context of a conversation
5. Which version of SNMP adds cryptographic protections? - ANSWER
SNMP 3
6. What is a proxy server? - ANSWER It takes requests from a client
system and forwards them to the destination server on behalf of the client.
, They can improve performance by caching, and restricting access by
filtering content.
7. Why are proxies useful? - ANSWER They have the ability to control and
filter outbound requests
8. What is a web security gateway? What's an example and what can it do? -
ANSWER It combines the function of a proxy and content-filtering.
9. Cisco Web Security Appliance - threat defense, content inspection, malware
protection, and data loss prevention (stopping PPI from leaving the
network)
10.What is an IDS? - ANSWER Designed to detect, log, and respond to
unauthorized network or host use, both in real time and after the fact
11.What is HIDS? - ANSWER Host based IDS - examines activity on
individual system, such as a mail server, web server, or individual PC
12.What is NIDS - ANSWER Network based IDS
13.What are the parts of an IDS? - ANSWER Traffic collector (or sensor)
Analysis engine
Signature database
User interface and reporting
,14.What are the four types of IDS? - ANSWER Behavior based
Signature based
Anomaly based - looks outside of "normal" patterns of normal network
behavior. Aka, linux commands sent to Windows computers.
Heuristic - uses AI to determine if something odd is happening
16.What is promiscuous mode? - ANSWER Setting that tells a NIC to
process every network packet it sees regardless of the intended destination
17.What is SPAN? - ANSWER Switch port analyzer, or port mirroring. A
port on a switch that will see all of the traffic passing through a switch or
specific VLAN
18.What is a WAF? - ANSWER Web application firewall. Performs
restrictions based on rules associated with HTTP/HTTPS
19.What is port security? - ANSWER Capability provided by switches that
allows you to control which devices and how many of them are allowed to
connect via each port on a switch
, 20.What is a flood guard? - ANSWER Used to defend against flooding
attacks, and flood guards manage traffic flows and block traffic
21.Where could a flood guard be implemented and against what? - ANSWER
In firewalls and IDS/IPS, and used to prevent against DoS and DDoS
22.What is STP? - ANSWER Spanning Tree Protocol. Allows for multiple
redundant paths while breaking loops. Operates at Data Link
23.What does implicit deny mean? - ANSWER If something is not
specifically permitted then it is not allowed.
24.What is UTM? - ANSWER Unified Threat Management. A marketing
term to describe all-in-one devices employed in network security.
25.What is trunking? - ANSWER Spanning a single VLAN across multiple
switches
26.What is NAC? - ANSWER Network Access Control. Form of security
where the endpoints are managed on a case-by-case basis as they connect
to the network. AKA, they can't do anything on the network until their
system is verified to be secure: AV, patches, etc., as defined by the
administrators
27.What is SaaS? - ANSWER Software as a service
28.What is PaaS? - ANSWER Platform as a service
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller EWLindy. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $12.99. You're not tied to anything after your purchase.