Created by DJ Perrone
about 7 years ago
|
||
What are some different methods of remote access?
What are some advantages of RDP?
What are some disadvantages of RDP?
What is VNC?
What are 3 components of VNC?
What port does VNC use by default?
What are some IPv4 to IPv6 transition mechanisms?
What is 6 to 4
What is Teredo?
- What is dual stack?
What is a GRE Tunnel?
Name at least 3 Network Authentication Methods
What is PAP?
What is CHAP ?
How many versions of CHAP are there?
What is MS-CHAP v1
What is MS-CHAP v2?
What is EAP?
How many versions of EAP are there?
What is EAP-MD5-CHAP?
What is EAP-TLS
What is EAP-TTLS?
What are the different authentication factors?
What is knowledge factor authentication?
What is ownership factor authentication?
What is characteristic factor authentication?
What is location factor authentication?
What is action factor authentication
What is 802.1X?
What 3 components make up 802.1X?
What are some characteristics of RADIUS?
What are some characteristics of TACACS+
What is UTM?
What are some advantages of using UTM?
What are some disadvantages of using UTM?
What is NIPS and what does it do?
What is NIDS and what does it do?
What is an IDS and what are the categories?
What are some characteristics of signature-based IDS?
With a signature-based IDS, what is pattern matching?
With a signature-based IDS, what is stateful-matching?
What an an anomaly-based IDS?
What are the different types of anomaly-based IDS's?
What is a statistical anomaly-based IDS?
What is a protocol anomaly-based IDS?
What is a traffic anomaly-based IDS?
What is a rule or heuristic-based IDS?
What is an application based IDS?
What is an INE or HAIPE?
What is SIEM?
What is an HSM?
For device placement, where should you place a UTM?
For device placement, where should you place a NIDS?
For device placement, where should you place an INE?
For device placement, where should you place a NIPS?
For device placement, where should you place a SIEM device?
What is a WAF?
What are advantages and disadvantages of in-line operation?
What are advantages and disadvantages of out-of-band operation?
What is a NGFW?
Where can a NGFW be placed?
What is an IPS?
What are the two IPS types?
What is a DAM?
What are some DAM architectures?
With regards to DAM, what is the interception-based model
With regards to DAM, what is the memory-based model
With regards to DAM, what is the log-based model
For device placement, where should you place a DAM?
What is ARP poisoning?
What are two mitigation techniques for ARP poisoning?
What are the 5 types of firewalls?
What is a packet filtering firewall?
What is a stateful firewall?
What is a proxy firewall?
What is a kernel proxy firewall?
Which proxy firewall operates at the session layer (L5)
Which proxy firewall operates at the application layer (L7)
Where is a packet-filtering firewall placed?
Where is a circuit level proxy placed?
Where is an application-level firewall placed?
Where is a kernel proxy firewall placed?
What is a bastion host?
What is a dual-homed firewall?
What is a multi-homed firewall?
What are some features of WLC?
What forms of authentication do WLAN controllers support?
What do firewalls use to do their job?
What is the order that firewall rules are examined?
What are the 5 steps of the formal change control process?
What are two types of availability controls?
What are 2 types of metrics used to measure control availability?
What is an SLA?
What is MTBF and MTTR
What is RAID 0?
What is RAID 1?
What is RAID 3?
What is RAID 5?
What is fail over?
What is fail soft?
What are different types of load balancing?
What are the 3 planes in a typical SDN architecture?
In reference to SDN, what is a control plane?
In reference to SDN, what is a data plane?
In reference to SDN, what is a management plane?
What are different types of cloud managed networks?
What are some indications, and sources of authentication attacks?
What are some indications, and sources of firewall attacks?
What are some indications, and sources of IPD/IDS attacks?
What is switch spoofing?
How do you prevent VLAN hopping?
What are the 5 services in Data-Flow enforcement?
What is NAC?
What are the 5 steps of Network Access Protection?
What is BACNet?
What is SCADA?
What are the components of SCADA?
What publications is useful for SCADA/ICS information?