Uploaded by pburleigh

3.3.6 - Network Appliances - Guided Notes

advertisement
Cybersecurity Guided Notes
Lesson 3.3.6 - Network Appliances
1. Match the following
A. Jump Server
An intermediate point between the user and
the service they are trying to access
B. Proxy Server
Identifies when an attack is occurring and then
notifies an end user
C. NIDS
A network system used to access and manage
devices within a security zone
D. NIPS
Stops an attack from happening
2. Match the following
A. Signature-based
Hashes data and checks these hashes against
known malicious threats
B. Behavior-based
A system recognizes when something is not like
the rest of the traffic
C. Anomaly-based
A system looks for instructions that are
potentially malicious
3. What is an HSM?
Copyright © 2022 Cyber Innovation Center
All Rights Reserved. Not for Distribution.
1
4. Match the following
A. Sensors
Acquires and interprets data
B. Collectors
A device that serves other devices
C. Aggregators
Detects information
5. What is a web application firewall?
6. What is the difference between stateful and stateless firewalls?
7. What is Unified threat management?
Copyright © 2022 Cyber Innovation Center
All Rights Reserved. Not for Distribution.
2
8. What can content/URL filtering help prevent?
9. What are some advantages/disadvantages of hardware firewalls? Software firewalls?
Copyright © 2022 Cyber Innovation Center
All Rights Reserved. Not for Distribution.
3
Download