4.1 cybersecurity devices and technologies

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/19

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

20 Terms

1
New cards

device that connects network segments and provides basic traffic filtering capabilities to determine which network segments are communicating with each other.

routers

2
New cards

security tool that determines the communications that go in and out of a network or device and identifies malicious traffic by analyzing network traffic.

firewalls

3
New cards

security tool that analyzes traffic signatures to match and block malicious traffic and attacks.

intrusion prevention systems

4
New cards

security tool that allows remote employees to securely access their organization’s network through an encrypted tunnel on their mobile computer. It also allows branch offices to connect to the headquarters network.

VPN

5
New cards

security tool that uses behavioral analysis of applications to identify and stop malicious code from running

antivirus

6
New cards

Cisco ISR 4000 is a device with routing, network filtering, and encryption capabilities in a single platform. Which security tool is it?

router

7
New cards

Cisco’s Firepower shows users what’s happening on their network. What security tools is it?

firewall

8
New cards

Cisco’s Anyconnect Secure Mobility Client allows users to securely connect to Apollo’s network anytime and anywhere, from any device. What security tool is it?

VPN

9
New cards

Cisco’s Advanced Malware Protection Threat Grid provides users with endpoint protection, scanning, and constant file monitoring to identify malicious files. What security tool is it?

antivirus.

10
New cards

identifier assigned to each application running on a device that ensures that the right data is passed to the right application

port number

11
New cards

the process of scanning a device, network, or server to identify open ports. It can be used by attackers for reconnaissance or by network administrators to verify network security.

port scanning

12
New cards

what does open mean after a port scan?

A service running on a network can be accessed by other network devices and can be exploited by an attacker.

13
New cards

security tools or tools that scans data against a database of rules and signatures to identify malicious traffic. If their is a match, it will log the detection and create an alert for the network administrator.

intrusion detection system

14
New cards

One of the most popular intrusion detection and prevention systems

snort

15
New cards

Cisco’s commercial intrusion detection and prevention system performs real-time traffic and port analysis, logging, content searching and matching, and detection probes

sourcefire

16
New cards

when attackers exploit a vulnerability before it is fixed

zero-day

17
New cards

cyber attack that requires real-time detection

distributed denial of service

18
New cards

why are DDOS difficult to defend against

because they originate from thousands of zombie hosts

19
New cards

enterprise-level security tool to protect against zero-days and advanced persistent threat actors

enterprise-level advanced malware detection solution

20
New cards

Cisco’s enterprise-level advanced malware detection solution analyzes millions of files against millions of malware artifacts revealing APT behaviors

Advanced Malware Protection Threat Grid