SearchNetworking.com's security expert Luis Medina has just published his first book, The Weakest Security Link...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Series, 1st Edition 2003, available in paperback, Adobe ebook, and MS Reader ebook format.
Here's your chance to win a copy! Be the first SearchNetworking.com member to correctly answer all ten questions and the ebook is yours.
After reading the question, write down the letter of your answer choice on scrap paper. E-mail your responses to us at firstname.lastname@example.org... be sure to include your full name and your title please.
1.) This is a standard for security that is located at the network or packet-processing layer of network communications, as opposed to the application layer.
d. passive FTP
2.) When fending off an attack, this is a method of monitoring network traffic that involves forwarding a copy of each incoming and outgoing packet from one port of a network switch to another port where the packet can be studied.
a. port mirroring
b. emanation monitoring
c. network scanning
3.) This is a common type of denial-of-service attack that involves sending more traffic to a network address than the temporary data storage area is intended to hold, thereby shutting down the service and possibly corrupting or overwriting valid data.
a. war dialing
b. buffer overflow
c. smurf attack
d. ping sweep
e. bucket brigade
4.) This is a computer host or small network inserted as a "neutral zone" between a company's private network and the outside public network.
c. man in the middle
e. sheepdip computer
5.) This is one of the older and slower methods an intruder might use to scan a network to determine which of a range of IP addresses map to live hosts.
b. brute force cracking
d. ping sweep
e. war driving
6.) This is a firewall facility that can monitor the state of active connections and use this information to determine which network packets to allow through the firewall.
a. ICMP sweep
b. dynamic packet filter
c. roving analysis port
d. logic bomb
e. static packet filter
8.) This is the transmission of data through a public network in such a way that the routing nodes in the public network are unaware that the transmission is part of a private network.
b. virtual private network
c. output feedback
e. promiscuous mode
9.) This occurs when a multitude of compromised systems attack a single targeted system, thereby causing the target system to shut down.
a. denial of service
b. global spy network
c. cipher block chaining
d. distributed denial-of-service attack
e. social engineering
10.) This allows remote workers to have secure access to their organization's network while using a public telecommunication infrastructure, such as the Internet.
a. shoulder surfing
d. hot site
e. intrusion detection system
Luis is also the author of "The Weakest Link Series," on SearchNetworking.com which offers network managers an opportunity to identify ongoing network security issues. This insightful series covers topics from combating network attacks to protecting your firewall. Join Luis on a journey to explore and identify the security vulnerabilities in your network.
View the series here.
Copy this into an e-mail -- insert your letter choice for each question and send it to us at email@example.com