06 Flashcards

1
Q

____________ is the one demand delivery of IT resources and applications across the internet

A

Cloud Computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

___________ is how you implement cloud in your business

A

Deployment methods

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In a ___________ the cloud infrastructure is provisioned for exclusive use by a single organization comprised of multiple consumers

A

Private Cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In aq ___________ the cloud infrastructure is provisioned for open use by the public and may be owned /operated by a business, academic, or government organization or both.

A

Public Cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A _____________ exists when multiple organizations share a common concern, such as specific security requirements

A

community cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A _____________ consists of the combination of two or more cloud deployment models

____________ where additional processing is handled outside the standard cloud infrastructure

A

Hybrid Cloud

Cloud Bursting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

____________ is how you utilize the cloud

A

service model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

_____________ Is the customers use of applications running from a cloud provider but they have no control over the infrastructure

A

SaaS Software as a service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

____________ is when a client creates their own applications or software but uses programming languages and tools supported by the cloud provider. The client has no control over the infrastructure

A

Paas Platform as a Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

_______________ is the provisioning of processing, storage, and networks to a customer

A

Infrastructure as a service Iaas

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

_____________ is the analysis and practice of concealing information and sensitive data

A

Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

______________ encrypts data, hiding contents from unauthorized users

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

______________ Provides checksums and supports digital signatures

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

_______________ Credential checks ensure availability to authorized users while denying access to unauthorized users

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

_______________ When user accounts are assigned a password, that password is hashed and stored in the system , whe the same account tries to login the password they enter is hashed and compared to the one stored in the database. If it matches their let in.

A

Password Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

______________ by hashing certain installed files, such as an executable, a user is assured that file has not been changed or replaced by another

A

File Verification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

_____________ Is a technique of providing confidentiality by converting ordinary data into ciphertext, which is unintelligible

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

____________ uses a single key to encrypt and decrypt the data. Both the sender and receiver must have a copy of the same key

A

Symmetric Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

____________ Uses a different key for encryption than decryption. Based on a one-way function where the same key used for encryption of the data cannot be used for decryption of the data.

A

Asymmetric encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

To be sure a sender is who they say they are ________________ are used.

A

digital signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Verifying identity and if the user is allowed to a space is achieved through _________________

A

digital certificates

22
Q

_______________ is the protection of the network devices, data, and users, in essence the network as a whole entity

A

network security

23
Q

A _________ is defined as something that has the potential to damage the network, to include data, hosts, or users.

A

Network threat

24
Q

Common network threats are?

A

Hardware failures
Access
Malware
Social engineering
Denial of service

25
Q

______________ is the duplication of components or the functions of a system and can go as far as having an entire secondary site on hand in case it is needed

A

redundancy

26
Q

____________ protects data through the means of logical controls. These controls include the use of passwords, permissions, access control lists, and traffic filtering devices such as firewalls

A

Logical Access

27
Q

___________ is the non-local logical access to a network systems or resources from a separate physical location.

A

Remote Access

28
Q

A _______ is a type of malicious software that distributes itself over the network via user interaction

A

Virus

29
Q

A ______ is a self-replicating and self-propagating type of malicious software. Unlike viruses, ______ do not need user interaction to execute

A

Worm

30
Q

_________ Is a seemingly innocent file that contains malicious code underneath

A

Trojan

31
Q

A ________ is a stealthy type of malware designed to hide existence of specific processes or programs from normal methods of detection and enable continued privilege access to the computer

A

RootKit

32
Q

All computers infected by a ______ are collectively called a _______, which allows system access to an attacker and causes the attackers computer too be the command-control server

A

bot, botnet

33
Q

Three main methods of malware prevention?

A

Anti-malware programs, training, procedures

34
Q

__________ is the process of exploiting human behavior to gain authorized access to information

A

social engineeering

35
Q

__________ can be broadly characterized by any action that prevents an unauthorized user rom accessing data, a device, or any resource they should normally have access to

A

DoS, Denial of service

36
Q

___________ overwhelms a system like DoS but through multiple source computers

A

DDos

37
Q

_________ are hardware and/or software that protect computers and networks from external attacks by utilizing permit/deny statements, filtering any unauthorized or illegitimate traffic

A

Firewalls

38
Q

__________ software applications or suite of applications installed ona single computer

A

Host-based firewall

39
Q

________ functioning on a network level, the firewall filters data as it travels from teh internet to computer on the network

A

Network-based firewalll

40
Q

An _________ is a security tool used to monitor a network and detect unauthorized activities and anomalies, to detect possible intrusions

A

Intrusion Detection System

41
Q

An _______ that respond to detected issues by blocking traffic or otherwise preventing the malicious activity.

A

Intrusion Prevention Systems

42
Q

___________ collects and analyzes data that originates on a computer that hosts a service, such as a web server

A

Host-Based Intrusion Detction/prevention system

43
Q

____________ Analyzes data packets that travel over the actual network to verify their nature as malicious or benign

A

Network-Based Intrusion Detction/prevention system

44
Q

________ is a framework of data protection for databases that contain usernames and passwords. What do these mean?

A

AAA
Authentication: presenting credentials to network
Authorization: The determination of what tasks are and are not allowed on the network
Accounting: keeping a log of everything that happens on the network

45
Q

__________ is an AAA standard used in supporting thousands of access points managed by ISPs and linking them to a single database

A

RADIUS, AAA vendor neutral

46
Q

__________ is another AAA protocol developed by Cisco to include access to routers and switches

A

TACACS AAA Cisco only

47
Q

________ Is yet another AAA protocol based on TACACS and developed by Huawei

A

HWTACACAS

48
Q

__________ Is a suite of protocols which allows for secure data transmissions over IP-based networks through authentication and encryption. It is a MANDATORY component of IPV6 because it works at layer 3 of the OSI model

A

IPsec

49
Q

The ___________ protocol handles authentication services for IPsec. AH provides data integrity and authentication for IP Traffic.

It ensures data integrity not security

A

Authentication Header (AH)

50
Q

The ________________ further protects a datagram by encrypting its payload, ensuring the privacy of a message. Uses a symmetric encryption algorithm to encrypt the payload of the ip packet

Ensures data security not integrity

A

Encapsulating security payload (ESP)

51
Q

The _____________ only encrypts and authenticates the payload of the IP packet, providing the most security by enabling the security functions between two communicating devices or end-points.

A

Transport mode

52
Q

__________ protects communication between routers and not end hosts. This method provides protection for portions of the route, which travels outside the organization.

A

Tunnel Mode