Chapter 1 Flashcards
Today, people working in cyberspace must deal with new and constantly evolving ________.
threats
Connecting your computers or devices to the ________ immediately exposes them to attack.
Internet
The world needs people who understand computer-systems ________ and who can protect computers and networks from criminals and terrorists.
security
___________ is the duty of every government that wants to ensure its national security.
Cybersecurity
A ___________ gives priorities to the functions an organization needs to keep going.
business continuity plan (BCP)
SIP is a ___________ protocol used to support real-time communications.
signaling
A ___________ defines how a business gets back on its feet after a major disaster like a fire or hurricane.
disaster recovery plan (DRP)
Software vendors must protect themselves from the liabilities of their own vulnerabilities with a(n) ____________.
End-User License Agreement (EULA)
____________ is the practice of hiding data and keeping it away from unauthorized users.
Cryptography
___________ is the process of transforming data from cleartext into ciphertext.
Encryption
____________ is the amount of time it takes to recover and make a system, application, and data available for use after an outage.
Recovery time objective (RTO)
The director of IT security is generally in charge of ensuring that the ____________ conforms to policy.
Workstation Domain
A ________ examines the network layer address and routes packets based on routing protocol path determination decisions.
Layer 3 switch
The ____________ represents the fourth layer of defense for a typical IT infrastructure.
LAN-to-WAN Domain
A ________ is a collection of computers connected to one another or to a common connection medium.
local area network (LAN)
The physical part of the LAN Domain includes a __________, which is an interface between the computer and the LAN physical media.
network interface card (NIC)
With wireless LANs (WLANs), radio transceivers are used to transmit IP packets from a WLAN NIC to a _____________.
wireless access point (WAP)
This security appliance examines IP data streams for common attack and malicious intent patterns.
intrusion detection system (IDS)
The ________ is where the fourth layer of defense is required.
LAN-to-WAN Domain
The tunnel can be created between a remote workstation using the public Internet and a VPN router or a secure browser and ________ Web site.
Secure Sockets Layer virtual private network (SSL-VPN)
The _________ Domain connects remote users to the organization_s IT infrastructure.
Remote Access
What fills security gaps and software weaknesses?
Testing and quality assurance
The goal and objective of a __________ is to provide a consistent definition for how an organization should handle and secure different types of data.
data classification standard
Which of the following is the definition of ciphertext?
The opposite of cleartext. Data sent as ciphertext is not visible and not decipherable.