11.3 Flashcards

1
Q

This also includes rude tiring irrelevant signatures and selecting the centers most relevant to a specific networks needs to most effectively use memory and processing resources with a scanning network traffic

A

Signature management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

This runs on a single computer to detect the attacks to that one house. This device solution may also include file integrity Monterey which alerts the system of any changes made to

A

Host based intrusion detection system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

This protects the net work or Porsche Netwerk that is using usually situated at the end of the net work or any networks protective perimeter known as a screen subnet

A

Netwerk intrusion detection system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

One drawback of the IDS is the number of – – – – – it can generate

A

False positives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Although an IDS can only text and log suspicious activity, a – – – – – – stands in line between the attacker and the target in Netwerk Orr host where it can prevent traffic from reaching that Netwerk or host

A

Intrusion Protection system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

NIPS can protect entire networks wall – – – – – – Can protect Hey single post

A

Netwerk intrusion prevention system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Controlling access to a Netwerk and its resources consists of three major elements. And occasionally you’ll hear this abbreviation with an additional word which is

A

Authentication authorization and accounting And accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Process of verifying to use his credentials

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

This process determines what user can or cannot do with network resources

A

Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The system log users access and activities on the net work

A

Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Local authentication processes or performs on local devices user name and password or stored locally which has both advantages and disadvantages such as

A

Low security
Convenience varies
Reliable back up access


How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Name and number of examples of Netwerk authentication and logon restrictions

A

 Time and day
Total time well done
Source address
Unsuccessful log on attempts
Geographic location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Most popular authorization message is – – – – –

A

Roll beast access control RBAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

With this role they never give me the shred I received from my music supervisor a detailed description of the role or jobs the user performs for the organization the administrator is responsible for assigning the privileges and permissions necessary for use your shirt perform only these roles

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Essentially a – – – insurance and no single person is giving sufficient power in a system to commit fraud or otherwise deeply compromise assistant integrity

A

Sod

How well did you know this?
1
Not at all
2
3
4
5
Perfectly