1/19
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
device that connects network segments and provides basic traffic filtering capabilities to determine which network segments are communicating with each other.
routers
security tool that determines the communications that go in and out of a network or device and identifies malicious traffic by analyzing network traffic.
firewalls
security tool that analyzes traffic signatures to match and block malicious traffic and attacks.
intrusion prevention systems
security tool that allows remote employees to securely access their organization’s network through an encrypted tunnel on their mobile computer. It also allows branch offices to connect to the headquarters network.
VPN
security tool that uses behavioral analysis of applications to identify and stop malicious code from running
antivirus
Cisco ISR 4000 is a device with routing, network filtering, and encryption capabilities in a single platform. Which security tool is it?
router
Cisco’s Firepower shows users what’s happening on their network. What security tools is it?
firewall
Cisco’s Anyconnect Secure Mobility Client allows users to securely connect to Apollo’s network anytime and anywhere, from any device. What security tool is it?
VPN
Cisco’s Advanced Malware Protection Threat Grid provides users with endpoint protection, scanning, and constant file monitoring to identify malicious files. What security tool is it?
antivirus.
identifier assigned to each application running on a device that ensures that the right data is passed to the right application
port number
the process of scanning a device, network, or server to identify open ports. It can be used by attackers for reconnaissance or by network administrators to verify network security.
port scanning
what does open mean after a port scan?
A service running on a network can be accessed by other network devices and can be exploited by an attacker.
security tools or tools that scans data against a database of rules and signatures to identify malicious traffic. If their is a match, it will log the detection and create an alert for the network administrator.
intrusion detection system
One of the most popular intrusion detection and prevention systems
snort
Cisco’s commercial intrusion detection and prevention system performs real-time traffic and port analysis, logging, content searching and matching, and detection probes
sourcefire
when attackers exploit a vulnerability before it is fixed
zero-day
cyber attack that requires real-time detection
distributed denial of service
why are DDOS difficult to defend against
because they originate from thousands of zombie hosts
enterprise-level security tool to protect against zero-days and advanced persistent threat actors
enterprise-level advanced malware detection solution
Cisco’s enterprise-level advanced malware detection solution analyzes millions of files against millions of malware artifacts revealing APT behaviors
Advanced Malware Protection Threat Grid