Datasheet

Book IV
Chapter 1
Network Security
Terminology
469
Lab Exercises
Term Description
___ Vulnerability A. Verifying a user’s identity.
___ Packet-filtering firewall B. Creates an encrypted tunnel over an unsecure
network.
___ Authentication C. Filters traffic by understanding the context of the
conversation.
____Mitigating threats D. A weakness in a piece of software or hardware.
___ CIA E. An area of the network used to place servers
that are accessed from the Internet.
___ VPN F. Implementing security controls to minimize the
threats against a system or device.
___ DMZ G. A device that identifies suspicious activity on a
system or network.
___ Stateful packet inspection
firewall
H. The fundamental goals of information security.
___ IDS I. Inspects the fields in the header of the packet to
decide whether to allow or deny the traffic.
Lab 1-2: Types of attacks
In this lab, review the different types of attacks by matching the term with
the appropriate description.
Term Description
___ Denial of service A. Type of malicious software that the user is
tricked into installing; it allows the hacker access to
the system.
___ IP spoofing B. Capturing network packets and being able to
view information in the packets.
___ Buffer overflow C. Overloading a system, which results in the
system not being able to perform its job.
___ Eavesdrop attack D. A type of password attack that tries dictionary
words but also adds numbers to the end of each
word.
___ Social engineering attack E. A self-replicating virus.
___ MAC spoofing F. Sending too much data input to an application.
___ Trojan virus G. Altering the layer-3 source address of a packet.
___ Hybrid attack H. Altering the layer-2 source address of a packet.
___ Worm virus I. A hacker tries to trick you into compromising
security through social contact.
22_647486-bk04ch01.indd 46922_647486-bk04ch01.indd 469 10/15/10 11:27 PM10/15/10 11:27 PM