6.7 Flashcards

1
Q

What defines the protection of the networks as a whole, individual devices, data, and even network users?

A

Network Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What type of deployment model is designated for use by the general public and exists on the cloud provider’s property?

A

Public Clouds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are electronic documents of credentials usually signed by a third party called a Certification Authority (CA)?

A

Certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a form of one-way encryption where data of variable length is input to an algorithm and a value of fixed length results are output?

A

Hashing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are six types of malware discussed in class? (More info on pg. 107)

A
  • Virus
  • Worm
  • Macro
  • Trojan
  • Rootkit
  • Adware/Spyware
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is defined as any program or code designed to perform an undesired function on a system?

A

Malicious Software (Malware)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What protocol handles authentication services for IPsec and allows the recipient of a message to verify the identity of the sender?

A

Authentication Header (AH)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the three types of access?

A
  • Physical Access
  • Logical Access
  • Remote Access
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What type of service model defines the customer use of applications running from a cloud provider?

A

Software as a Service (SaaS) (Email distribution gmail, yahoo, hotmail)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Type of encryption that uses a different key for encryption than is used for decryption.

A

Assymmetric Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is defined as something that has the potential to damage the network, to include data, hosts, or users?

A

Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What kind of deployment model defines one specific company or organization using the entire cloud infrastructure?

A

Private Cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the analysis and practice of concealing information and securing sensitive data?

A

Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is created in order to allow remote connections from the Internet into the private network?

A

VPN Tunnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is it called when additional processing can be handled outside of the normal cloud infrastructure and into another?

A

Cloud bursting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What acts as a gateway into the network inside of RADIUS?

A

Network Access Server (NAS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which mode of IPsec provides the most security by enabling the security functions between any two communicating devices or end-points?

A

Transport mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What AAA standard is used in supporting thousands of access points managed by Internet Service Providers (ISPs) and linking them to a single database?

A

Remote Authentication Dial-In User Service (RADIUS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are two types of encryption?

A

Symmetric Encryption and Asymmetric Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are the modes of protection provided by IPsec?

A

Transport Mode and Tunnel Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What type of service model is providing the customer with processing, storage and networks?

A

Infrastructure as a Service (IaaS) (Hardware located in the cloud, Amazon Web Service)

22
Q

What is a technique of providing confidentiality by converting plaintext, or ordinary data, into ciphertext, which is unintelligible?

A

Encryption

23
Q

What is the framework of data protection for databases, which contain usernames and passwords?

A

Authentication, Authorization, and Accounting (AAA)

24
Q

What is hashing most often used to provide confidentiality for?

A

Password Authentication, and File Verification

25
Q

What type of deployment model consists of a combination of two or more cloud deployment model’s?

A

Hybrid Clouds

26
Q

Type of encryption that uses a single key for both encrypting and decrypting the data.

A

Symmetric Encryption

27
Q

What gives commands to other compromised machines?

A

Command and Control (C&C)

28
Q

What is suite of protocols that allows for secure data transmissions over IP-based networks through authentication and encryption?

A

Internet Protocol Security (IPsec)

29
Q

What kind of attack overwhelms a system through multiple computer sources?

A

Distributed Denial of Service (DDOS)

30
Q

What is the process of tricking people to gain unauthorized access?

A

Social Engineering

31
Q

What AAA standard that separates authentication and authorization processes and includes access to routers and switches?

A

Terminal Access Controller Access Controller System Plus (TACACS+)

32
Q

What are the five pillars of Information Assurance (IA)?

A
  • Confidentiality
  • Integrity
  • Availability
  • Nonrepudiation
  • Authentication
33
Q

A virus is a program that can do what?

A

Replication and Activation

34
Q

What type of service model defines when a client creates their own applications or software, but use programming languages and tools supported by the cloud provider?

A

Platform as a Service (PaaS) (hosting webpage, GODADDY.com, salesforce)

35
Q

What is the CIA Triad?

A

It is Information Security that is provided through confidentiality, integrity, and availability.

36
Q

What is the party that signs and verifies a certificate?

A

Certification Authority (CA)

37
Q

What utilizes hashing functions and appends the information to a message, associating a sender with the data?

A

Digital Signature

38
Q

In what two ways is AAA supported?

A

Remote Authentication Dial-In User Service (RADIUS) and Terminal Access Controller Access Control System Plus (TACACS+)

39
Q

What is defined as entry into an area, device, or the ability to retrieve data?

A

Access

40
Q

What is a group of computers under the control of an operator is called what?

A

Botnet

41
Q

What extends a LAN over an intermediate and usually unsecure infrastructure such as the Internet?

A

Virtual Private Network (VPNs)

42
Q

What are the most common of threats?

A
  • Hardware Failures
  • Access
  • Malware
  • Social Engineering
  • Denial of Service (DoS)
43
Q

What mode of IPsec protects communication between routers and not the ends hosts?

A

Tunnel Mode

44
Q

What kind of attack involves an adversary flooding a network with enough traffic to overwhelm it?

A

Denial of Service (DoS)

45
Q

What are the two core protocols of IPsec?

A

Authentication Header (AH) and Encapsulating Security Payload (ESP)

46
Q

What is the idea by which people and businesses can use needed resources without actually having to purchase them?

A

Cloud computing

47
Q

What are each of the computers being controlled in a DDoS attack called?

A

Zombie

48
Q

What kind of social engineering consists of both reating a site, which seems trusted, and then soliticing people who visit is?

A

Phishing

49
Q

What type of network logically separates a single device into different resource groups?

A

Virtual Local Area Networks (VLANs)

50
Q

What protocol protects a datagram by encrypting its payload which ensures the privacy of a message?

A

Encapsulating Security Payload (ESP)

51
Q

What type of deployment model happens when multiple organizations share a common concern and occupy the same “area”?

A

Community Cloud