Chapter 7 - Administering A Secure Network Flashcards
Simple network management protocol (SNMP)
A TCP/IP protocol that exchanges management information between networked devices. It allows network administrators to remotely monitor, manage, and configure devices in the network.
Domain name system security extensions (DNSSEC)
An extension to DNS that adds additional resource records and message header information, used to verify that DNS data has not been altered in transmission.
File transfer protocol (FTP)
An unsecure TCP/IP protocol that is commonly used for transferring files.
FTP Secure (FTPS)
A TCP/IP protocol that uses Secure Sockets Layer or Transport Layer Security to encrypt commands sent over the control port (port 21) in an FTP session.
Secure FTP (SFTP)
A secure TCP/IP protocol that is used for transporting files by encrypting and compressing all data and commands.
SSL/TLS accelerator
A separate hardware card that inserts into a web server that contains one or more co-processors to handle SSL/TLS processing.
Port mirroring
A facility that allows the administrator to configure a switch to copy traffic that occurs on some or all ports to a designated monitoring port on the switch.
Network tap (test access point)
A separate device that can be installed on the network for monitoring traffic.
Aggregation switch
A device used to combine multiple network connections with not a single link.
Correlation engine
A device that aggregates and correlates content from different sources to uncover an attack.
DDoS mitigator
A hardware device that identifies and blocks real-time distributed denial of service (DDoS) attacks.
Log
A record of events that occur.
Data execution prevention (DEP)
A Microsoft Windows feature that prevents attackers from using buffer overflow to execute malware.
File integrity check (FIC)
A service that can monitor any changes made to computer files.
Application whitelisting
An inventory of applications and associated components (libraries, configuration files, etc.) that have been pre-approved and authorized to be active and present in the device.
Removable media control
Tools that can be used to restrict which removable media, such as USB flash drives, can be attached to a system.
Advanced malware management
A third-party service that monitors a network for any unusual activity.
Virtualization
A means of managing and presenting computer resources by function without regard to their physical layout or location.
Hypervisor
Software that manages virtual machine operating systems.
Type I hypervisor
A virtual machine management program that runs directly on the computer’s hardware instead of the host operating system.
Type II hypervisor
A virtual machine management program that runs on the host operating system.
Container (or application cell)
A virtualization environment that holds only the necessary operating system components (such as binary files and libraries) that are needed for a specific application to run.
Virtual desktop infrastructure (VDI)
The process of running a user desktop inside a virtual machine that resides on a server for storing sensitive applications and data on a remote server that is accessed through a smartphone.
Virtual distributed Ethernet (VDE)
An Ethernet-compliant virtual network that can connect physical computers and/or virtual machines together.
Virtual machine escape protection
A security protection that prevents a virtual machine from directly interacting with the host operating system.
Virtual machine sprawl
The widespread proliferation of virtual machines without proper oversight or management.
Cloud computing
A pay-per-use computing model in which customers pay only for the online computing resources that they need, and the resources can be easily scaled.
Public cloud
A cloud in which the services and infrastructure are offered to all users with access provided remotely through the internet.
Community cloud
A cloud that is open only to specific organizations that have common concerns.
Private cloud
A cloud that is created and maintained on a private network.
Hybrid cloud
A combination of public and private clouds.
Cloud storage
A cloud system that has no computational capabilities but provides remote file storage.
Software as a service (SaaS)
A model of cloud computing in which the vendor provides access to the vendors software applications running on a cloud infrastructure.
Platform as a service (PaaS)
A cloud service in which consumers can install and run their own specialized applications on the cloud computing network.
Infrastructure as a service (IaaS)
A cloud computing model in which customers have the highest level of control and can deploy and run their own software.
Security as a service (SECaaS)
A cloud model in which all security services are delivered from the cloud to the enterprise.
Cloud access security broker (CASB)
A set of software tools or services that resides between the enterprises’ on premises infrastructure and the cloud providers infrastructure to ensure that the security policies of the enterprise extend to their data in the cloud.
Software defined network (SDN)
Software that virtualizes part of the physical network so that it can be more quickly and easily reconfigured.