Router, firewall
Implicit deny
Tunnel, transport
Reverse proxy, inspect
Wireless packet sniffer, decloak
Secure tunnel
Port security, 802.1x
Honeypot
False positive
Input filters
An ________ NIPS has traffic flowing through it; however, the NIDS is known as ________ and relies on sensors and collectors to discover new attacks.
Inline, passive
_________ __________ inspects traffic going to a website, whereas a _______ ________ inspects traffic across the network.
Banner Grabbing, packet sniffer
Banner grabbing uses tools such as Dimitri, _____, ________, and ________.
Nmap, telnet, and netcat
__________ shows established connections in a Windows environment, whereas _________ shows established connections in a Linux/Unix environment.
Netstat, netcat (nc)
A _____ system correlates security logs from various devices such as servers and firewalls. The security administrator has decided to store the logs into a _______ drive so that they can be read but not tampered with as they may be needed as evidence at a later date.
SIEM, WORM
A company could use a ____-__-____ VPN instead of an expensive lease line or even more expensive dark fiber, but it must be set to _______ - ___ mode.
Site-to-site, always-on
A _____ ________ could be used as a spam filter and a ____ solution to prevent PII and sensitive information from leaving the company.
Mail gateway, DLP
Both ____ and a ______ can detect when new hosts have been added to your internal network.
Nmap, NIDS
A __________-______ NIDS/NIPS uses a known database and is reliant on regular updates where _______- _____ NIDS/NIPS start with a known database but can identify new variants.
Signature-based, anomaly-based
A security administrator changes the default _________ and _________, disables the SSID, and enables ______ filtering to make a wireless access point more secure.
Username, password, MAC