Devices and Infrastructure Flashcards

1
Q

Access control list (ACL)

A

Data file that specified whether a user has access to a specific resource on a computer or network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ACL

A

access control list

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Access point (AP)

A

The point at which access to a network is accomplished

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

AP

A

access point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Active response

A

A response generated in real time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Alarm

A

A notification that an unusual condition exists and should be investigated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Alert

A

An indication that an unusual condition COULD exist and should be investigated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

all-in-one

A

An appliance that performs multiple functions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Analyzer

A

The component or process that analyzes the data collected by the sensor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Anomalies

A

Variations from normal operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Anomaly-detection intrusion detection system (AD-IDS)

A

Works by looking for deviations from a pattern of normal network traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

AD-IDS

A

anomaly-detection intrusion detection system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Application-level proxy

A

A device or software that recognizes application-specific commands and offers gradual control over them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Authentication header (AH)

A

An IPSec header used to provide connectionless integrity and data origin authentication; provides protection against replays

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

AH

A

authentication header

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Compensating controls

A

Gap controls that fill in the coverage between the other types of vulnerability mitigation techniques

“Where there are holes in coverage, we compensate for them”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Data loss prevention (DLP)

A

Any systems that monitor and protect data to prevent it from unauthorized use, modification, or destruction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

DLP

A

data loss prevention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Encapsulating Security Payload (ESP)

A

IPSec header used to provide a mix of security services in IPv4 and IPv6; can be used with IP authentication header (AH)

20
Q

ESP

A

encapsulating security payload

21
Q

Encapsulation

A

The process of enclosing data in a packet

22
Q

Host-based IDS (HIDS)

A

An intrusion detection system that is just based (as opposed to network based)

23
Q

HIDS

A

host-based intrusion detection system

24
Q

Hardware security module (HSM)

A

A software or appliance stand-alone used to enhance security; commonly used with PKI systems

25
Q

Implicit deny

A

A condition that states that u less otherwise given, the permission will be denied

26
Q

Internet Protocol Security (IPSec)

A

A set of protocols that enable encryption, authentication, and integrity over IP; commonly used with VPN

27
Q

HSM

A

hardware security module

28
Q

IPSec

A

Internet Protocol Security

29
Q

Key management

A

Management of all aspects of cryptographic keys in a cryptosystem (key generation, storage, etc)

30
Q

Load balancing

A

Dividing a load for greater efficiency of management among multiple devices

31
Q

Network access control (NAC)

A

The set of standards defined by the network for clients attempting to access it

32
Q

NAC

A

network access control

33
Q

Network intrusion prevention systems (NIPS)

A

An intrusion prevention system that is network based

34
Q

NIPS

A

network intrusion prevention system

35
Q

Network-based IDS (NIDS)

A

An approach to an intrusion detection system; placed at a point in the network where it can monitor and report on all network traffic

36
Q

Passive response

A

A nonactive response

Ex: logging, monitoring, etc

37
Q

NIDS

A

network-based intrusion detection system

38
Q

Proxy

A

A type of system that prevents direct communication between a client and a host by acting as an intermediary

39
Q

Proxy firewall

A

A proxy server that also acts as a firewall, blocking network access from external networks

40
Q

Secure Sockets Layer (SSL)

A

A protocol that secures messages by operating between the Application later (HTTP) and the transport layer

41
Q

SSL

A

Secure Sockets Layer

42
Q

SIEM

A

Security Information and Event Management

43
Q

Security Information and Event Management (SIEM)

A

Combines security information management (SIM) and security event management (SEM) functions to provide real-time analysis of security alerts

44
Q

Signature-based system

A

A system that acts based on the digital signature it sees and offers no repudiation to increase the integrity of a message

45
Q

SSID broadcast

A

An access point’s broadcasting of the network name

46
Q

Switch

A

A network device network that can replace a router in a local network