6.7 Flashcards

1
Q

What defines the protection of the networks as a whole, individual devices, data, and even network users?

A

Network Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What type of deployment model is designated for use by the general public and exists on the cloud provider’s property?

A

Public Clouds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are electronic documents of credentials usually signed by a third party called a Certification Authority (CA)?

A

Certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a form of one-way encryption where data of variable length is input to an algorithm and a value of fixed length results are output?

A

Hashing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are six types of malware discussed in class? (More info on pg. 107)

A
  • Virus
  • Worm
  • Macro
  • Trojan
  • Rootkit
  • Adware/Spyware
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is defined as any program or code designed to perform an undesired function on a system?

A

Malicious Software (Malware)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What protocol handles authentication services for IPsec and allows the recipient of a message to verify the identity of the sender?

A

Authentication Header (AH)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the three types of access?

A
  • Physical Access
  • Logical Access
  • Remote Access
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What type of service model defines the customer use of applications running from a cloud provider?

A

Software as a Service (SaaS) (Email distribution gmail, yahoo, hotmail)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Type of encryption that uses a different key for encryption than is used for decryption.

A

Assymmetric Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is defined as something that has the potential to damage the network, to include data, hosts, or users?

A

Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What kind of deployment model defines one specific company or organization using the entire cloud infrastructure?

A

Private Cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the analysis and practice of concealing information and securing sensitive data?

A

Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is created in order to allow remote connections from the Internet into the private network?

A

VPN Tunnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is it called when additional processing can be handled outside of the normal cloud infrastructure and into another?

A

Cloud bursting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What acts as a gateway into the network inside of RADIUS?

A

Network Access Server (NAS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which mode of IPsec provides the most security by enabling the security functions between any two communicating devices or end-points?

A

Transport mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What AAA standard is used in supporting thousands of access points managed by Internet Service Providers (ISPs) and linking them to a single database?

A

Remote Authentication Dial-In User Service (RADIUS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are two types of encryption?

A

Symmetric Encryption and Asymmetric Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are the modes of protection provided by IPsec?

A

Transport Mode and Tunnel Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What type of service model is providing the customer with processing, storage and networks?

A

Infrastructure as a Service (IaaS) (Hardware located in the cloud, Amazon Web Service)

22
Q

What is a technique of providing confidentiality by converting plaintext, or ordinary data, into ciphertext, which is unintelligible?

A

Encryption

23
Q

What is the framework of data protection for databases, which contain usernames and passwords?

A

Authentication, Authorization, and Accounting (AAA)

24
Q

What is hashing most often used to provide confidentiality for?

A

Password Authentication, and File Verification

25
What type of **deployment model** consists of a combination of two or more cloud deployment model's?
**Hybrid Clouds**
26
Type of encryption that uses a single key for both encrypting and decrypting the data.
*Symmetric Encryption*
27
What gives commands to other compromised machines?
**Command and Control (C&C)**
28
What is suite of protocols that allows for secure data transmissions over IP-based networks through authentication and encryption?
**Internet Protocol Security (IPsec)**
29
What kind of attack overwhelms a system through multiple computer sources?
**Distributed Denial of Service (DDOS)**
30
What is the process of tricking people to gain unauthorized access?
**Social Engineering**
31
What **AAA** standard that separates authentication and authorization processes and includes access to routers and switches?
**Terminal Access Controller Access Controller System Plus (TACACS+)**
32
What are the **five pillars of Information Assurance (IA)?**
* *Confidentiality* * *Integrity* * *Availability* * *Nonrepudiation* * *Authentication*
33
A virus is a program that can do what?
**Replication** and **Activation**
34
What type of **service model** defines when a client creates their own applications or software, but use programming languages and tools supported by the cloud provider?
**Platform as a Service (PaaS)** (hosting webpage, GODADDY.com, salesforce)
35
What is the **CIA Triad?**
It is Information Security that is provided through *confidentiality, integrity,* and *availability.*
36
What is the party that signs and verifies a **certificate?**
**Certification Authority (CA)**
37
What utilizes hashing functions and appends the information to a message, associating a sender with the data?
**Digital Signature**
38
In what two ways is **AAA** supported?
**Remote Authentication Dial-In User Service (RADIUS)** and **Terminal Access Controller Access Control System Plus (TACACS+)**
39
What is defined as entry into an area, device, or the ability to retrieve data?
**Access**
40
What is a group of computers under the control of an operator is called what?
**Botnet**
41
What extends a LAN over an intermediate and usually unsecure infrastructure such as the Internet?
**Virtual Private Network (VPNs)**
42
What are the most common of **threats?**
* *Hardware Failures* * *Access* * *Malware* * *Social Engineering* * *Denial of Service (DoS)*
43
What mode of IPsec protects communication between routers and not the ends hosts?
**Tunnel Mode**
44
What kind of attack involves an adversary flooding a network with enough traffic to overwhelm it?
**Denial of Service (DoS)**
45
What are the two core protocols of IPsec?
**Authentication Header (AH)** and **Encapsulating Security Payload (ESP)**
46
What is the idea by which people and businesses can use needed resources without actually having to purchase them?
**Cloud computing**
47
What are each of the computers being controlled in a DDoS attack called?
**Zombie**
48
What kind of **social engineering** consists of both reating a site, which seems trusted, and then soliticing people who visit is?
**Phishing**
49
What type of network logically separates a single device into different resource groups?
**Virtual Local Area Networks (VLANs)**
50
What protocol protects a datagram by encrypting its payload which ensures the privacy of a message?
**Encapsulating Security Payload (ESP)**
51
What type of **deployment model** happens when multiple organizations share a common concern and occupy the same "area"?
**Community Cloud**