Chapter 7 Flashcards

1
Q

a third-party service that monitors a network for any unusual activity

A

advanced malware management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

a device used to combine multiple network connections into a single link.

A

aggregation switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

see container

A

application cell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

an inventory of applications and associated components (libraries, configuration files, etc.) that have been pre-approved and authorized to be active and present on the device.

A

application whitelisting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

a set of software tools or services that reside between the enterprises’ on-premises infrastructure and the cloud provider’s infrastructure to ensure that the security policies of the enterprise extend to their data in the cloud.

A

cloud access security broker (CASB)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

a pay-per-use computing model in which customers pay only for the online computing resources that they need, and the resources can be easily scaled.

A

cloud computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

a cloud system that has no computational capabilities but provides remote file storage

A

cloud storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

a cloud that is open only to specific organizations that have common concerns

A

community cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

a virtualized environment that holds only the necessary operating system components (such as binary files and libraries) that are needed for a specific application to run. Also called an application cell.

A

container

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

a device that aggregates and correlates content from different sources to uncover an attack.

A

correlation engine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

a microsoft windows feature that prevents attackers from using buffer overflow to exe

A

data execution prevention (DEP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly