Chapter 9 Key Terms Flashcards

1
Q

Physical machine

A

The physical computer with hardware, such as the hard disk drive(s), optical drive, RAM, and motherboard.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Virtual machine

A

A software implementation of a computer that executes programs like a physical machine.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Virtual hard disk (VHD)

A

A file that is created within the host operating system and simulates a hard disk for the virtual machine.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Hypervisor

A

A thin layer of software that resides between the guest operating system and the hardware. It creates and runs virtual machines.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Load balancing

A

A technique that disperses a workload between two or more computers or resources to achieve optimal resource utilization, throughput, or response time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Virtual network

A

A computer network consisting of virtual and physical devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Virtual area network

A

A virtual LAN running on top of a physical LAN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Virtual private network

A

A secure tunnel to another network that connects multiple remote end-points.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Virtual machine

A

A virtual computer that functions like a physical computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Virtual switch

A

Software that facilitates the communication between virtual machines by checking data packets before moving them to a destination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Virtual router

A

Software that replicates the functionality of a physical router.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Virtual firewall appliance

A

Software that functions as a network firewall device. A virtual firewall appliance provides packet filtering and monitoring functions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Virtual machine monitor

A

Software, firmware, or hardware that creates and runs virtual machines.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Software-defined network

A

An architecture that allows network and security professionals to manage, control, and make changes to a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Cloud

A

A metaphor for the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Cloud computing

A

Software, data access, computation, and storage services provided to clients through the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Public cloud

A

Platforms, applications, storage, or other resources that are mad available to the general public by a cloud service provider.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Private cloud

A

Platforms, applications, storage, or other resources that are made available to a single organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Community cloud

A

Platforms, applications, storage, or other resources that are shared by several organizations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Hybrid cloud

A

A combination of public, private and community cloud resources from different service providers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Cloud access security broker (CASB)

A

An on-premises cloud-based software tool or service that sits between an organization and a cloud service provider.

22
Q

Virtual networks

A

Virtual machines and devices connected through software.

23
Q

Segmentation

A

The division of a network into smaller networks through a virtual local area network (VLAN) and firewalls.

24
Q

Security group

A

A security group works like a firewall to control traffic to and from network resources.

25
Q

Virtual private cloud (VPC) endpoint

A

A virtual device that provides a private connection between virtual private clouds and a cloud provider’s services. A VPC endpoint keeps traffic secure with a private link resource.

26
Q

Container

A

A standard unit of software that holds the complete runtime environment including an application, all application dependencies, libraries, binaries, and configuration files.

27
Q

Cloud-based firewall

A

A software network device that is deployed in the cloud that protects against unwanted access to a private network.

28
Q

App whitelisting

A

The process of identifying apps that users are allowed to have on mobile devices.

29
Q

Geotagging

A

The process of embedding GPS coordinates within mobile device files, such as image or video files created with the device’s camera.

30
Q

Data exfiltration

A

The unauthorized copy, transfer, or retrieval of data from a computer, server, or network.

31
Q

Sandboxing

A

The isolation of an app so that it can’t affect other areas of a computer or network.

32
Q

Jailbreaking

A

The process of removing inherent protections placed by the device manufacturer.

33
Q

Sideloading

A

Installing an app on a mobile device via a method other than the manufacturer’s app repository.

34
Q

Windows information protection

A

A technology that helps protect against data leakage on company-owned and personal devices without disrupting the user experience.

35
Q

Network fencing

A

Location compliance, known as network fencing, allows you to keep devices outside your corporate network from accessing network resources.

36
Q

Mobile device management

A

The administration of mobile devices. MDM software generally allows for tracking devices; pushing apps and updates; managing security settings; and remotely wiping the device.

37
Q

Mobile application management

A

The administration of applications on a mobile device. MAM software allows a system administrator to remotely install or remove organizational apps and to disable certain functions within the apps.

38
Q

Enterprise mobility management

A

A combination of MDM and MAM solutions in one package. EMM allows a system administrator to remotely manage hardware and applications on a mobile device.

39
Q

Unified endpoint management

A

An all-in-one device management solution. UEM allows a system administrator to manage local and mobile devices, including Internet of Things devices.

40
Q

Bring your own device (BYOD)

A

The practice of having employees use their own personal mobile devices for business related tasks.

41
Q

Bring your own device

A

A BYOD policy allows employees to use personal devices for work related tasks.

42
Q

Acceptable use policy

A

An AUP determines the rules for using corporate resources, such as internet access, computers, etc.

43
Q

Virtual desktop infrastructure

A

VDI is a technology that uses virtual machines and virtual desktops.

44
Q

choose your own device

A

In a CYOD system, the company provides a list of approved devices for an employee to choose from. The ownership and management of devices varies by organization.

45
Q

Corporate owned, personally enabled

A

In a COPE system, the company provides a list of approved devices for an employee to choose from. The company owns the device; the employee uses and manages the device.

46
Q

Supervisory control and data acquisition (SCADA)

A

SCADA is an industrial computer system that monitors and controls a process.

47
Q

Internet of Things

A

The network of physical devices such as vehicles, home appliances, etc. that are embedded with electronics, software, sensors, actuators, and connectivity that enable them to connect, collect, and exchange data through the internet.

48
Q

Arduino

A

Arduino is an open-source hardware and software platform for building electronic projects.

49
Q

Raspberry Pi

A

Raspberry Pi is a low-cost device the size of a credit card that’s powered by the Python programming language. It’s manufactured into a single system on a chip (SoC).

50
Q

Field Programmable Gate Array (FPGA)

A

FPGA is an integrated circuit that the customer configures.

51
Q

Subscriber identity module (SIM) card

A

A SIM card encrypts data transmission and stores information.

52
Q

Zigbee

A

Zigbee is a radio protocol that creates low-rate private area networks