Ch 7 Key Terms Flashcards

1
Q

a Microsoft Windows feature that prevents attackers from using buffer overflow to execute malware

DLP
DLL
DEP
SCP

A

DEP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

all security services are delivered from the cloud to the enterprise. Relieves the enterprise from purchasing and managing security HW and SW.

community cloud
Infrastructure as a Service (IaaS)
Security as a Service (SECaaS)
Platform as a Service (PaaS)

A

Security as a Service (SECaaS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Although the control port (21) commands are encrypted the data port (20) may or may not be encrypted

SSH
TFTP
Secure FTP (SFTP)
FTP Secure (FTPS)

A

FTP Secure (FTPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

a network protocol used by Windows-based computers that allows systems within the same network to share files. It allows computers connected to the same network or domain to access files from other local computers as easily as if they were on the computer’s local hard drive.

Not only does ______________ allow computers to share files, but it also enables computers to share printers and even serial ports from other computers within the network

SMB

SNMP

Netstat

NetBIOS

A

SMB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

substitutes addresses so that the computer is redirected to another device

DNSSEC

DNS poisoning

Smurf attack

ARP poisoning

A

DNS poisoning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

the cloud computing vendor provides access to the vendor’s software applications running on a cloud infrastructure

Platform as a Service (PaaS)

Infrastructure as a Service (IaaS)

Software as a Service (SaaS)

Security as a Service (SECaaS)

A

Software as a Service (SaaS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Functions by exchanging management information between networked devices

NetStat

NetBIOS

SNMP

SMB

A

SNMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

an entire protocol, not pieced together with multiple parts; uses only a single TCP port instead of two

SSH

FTPS

SCP

SFTP

A

SFTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

uses SSL/TLS to encrypt commands sent over the control port (21)

SCP

Telnet

SFTP

FTPS

A

FTPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

a protocol for securing email messages

POP3

IMAP

SMTP

S/MIME

A

S/MIME

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

a cloud that is open only to specific organizations that have common concerns

private cloud

community cloud

hybrid cloud

public cloud

A

community cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

a pay-per-use computing model in which customers pay only for the online computing resources they need

hybrid cloud

cloud computing

public cloud

community cloud

A

cloud computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

thwarts DNS poisoning

DNS

DHCP

DNSSEC

Active Directory

A

DNSSEC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

consumers can install and run their own specialized applications on the cloud computing network

Platform as a Service (PaaS)

Infrastructure as a Service (IaaS)

Security as a Service (SECaaS)

Software as a Service (SaaS)

A

Platform as a Service (PaaS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

services and infrastructure are offered to all users with access provided remotely through the Internet

cloud computing

hybrid cloud

community cloud

public cloud

A

public cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

a service that can monitor any changes made to computer files, such as operating system files

OSI

DEP

DLP

FIC

A

FIC

17
Q

allows network administrators to remotely monitor, manage, and configure devices on the network

NetStat

SNMP

FTPS

NetBIOS

A

SNMP

18
Q

used to verify that the requested data has not been altered in transmission. Found in DNSSEC.

resource records

message header info

IPSec

PKI

A

Resource records &

message header info

19
Q

the customer has the highest level of control

Infrastructure as a Service (IaaS)

Security as a Service (SECaaS)

Software as a Service (SaaS)

Platform as a Service (PaaS)

A

Infrastructure as a Service (IaaS)

20
Q

small amount of memory with limited functionality. Often used for the automated transfer of configuration files between devices

Telnet

TFTP

SFTP

FTP

A

TFTP