Domain 4 Flashcards

1
Q

Control traffic flow on networks and connect similar networks

A

Router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Filter traffic based on a defined set of rules. Also called ACLs

A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Computer that provides info to other computers on a network

A

Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

End of network communication link. A client makes a request to use a network resource.

A

Endpoint

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Represent network interface within the network and maintain communications when physical device when swapped with new hardware.

A

IP Address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the Upper Layer of the OSI Model?

A

Layers 5-7 (SPA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the Lower Layer of the OSI Model?

A

Layers 1-4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Framework for how protocols should function. Common reference to understand components of software interfaces to physical hardware

A

OSI Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Adds information to a packet as it travels to its destination

A

Encapsulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Referencing image file like JPEG or PNG

A

Presentation Layer 6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Logical ports like NetBIOS

A

Session Layer 5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Discussing TCP/UDP

A

Transport Layer 4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Discussing Routers that are sending packets

A

Network Layer 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Discussing switches, bridges or WAPs sending frames

A

Data Link Layer 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Data moves up the OSI model layers from physical to application

A

De-Encapsulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How data moves through the network

A

Network Interface Layer (TCP/IP Layers)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Creates/Inserts packets

A

Internet Layer (TCP/IP Layers)

18
Q

Permits data to move among devices

A

Transport Layer (TCP/IP Layers)

19
Q

Defines the protocols for the transport layer

A

Application Layer (TCP/IP Layers)

20
Q

Determine health of a network or specific link. By ping, traceroute and other network management tools.

A

Internet Control Message Protocol (ICMP)

21
Q

10.0.0.0 to 10.255.255.254
172.16.0.0 to 172.31.255.254
192.168.0.0 to 192.168.255.254

A

Private Addresses

22
Q

Ensure integrity and confidentiality of IP packets and allow communicating partners to authenticate each other

23
Q

Help services obtain an appropriate share of a network’s bandwidth.

24
Q

Security event or multiple events where an intruder gains, attempts or access a system without authorization

25
Q

Event that actually/potentially jeopardize the CIA of an information system, which is processed, stored or transmitted

26
Q

Action that takes advantage of a flaw in a computer system or software. System vulnerabilities

27
Q

Loss of control, compromise, unauthorized disclosure where a person non authorized accesses PII, other than an authorized purpose.

28
Q

Process of preparing, detecting, analyzing, containing, eradicating and recovering from a security incident

A

Incident Response

29
Q

Train staff, implement incident response team, identify roles & responsibilities and identify critical data, systems and any single points of failure

A

Incident Response Preparation

30
Q

Monitor all possible attack vectors, prioritize incident response and incident documentation

A

Incident Response Detection & Analysis

31
Q

Gather evidence, appropriate containment strategy, identify and isolate the attack

A

Incident Response Containment, Eradication and Recovery

32
Q

Senior management, info security professionals, public affairs and engineering representatives

A

Incident Response Team Members

33
Q

Act of developing plans and procedures for maintaining business operations in event of a disaster or security incident

A

Business Continuity

34
Q

Process to evaluate potential effects of threats that interrupt critical business functions for the purpose of determining recovery plans

A

Business Impact Analysis

35
Q

A set of standardized rules that allow computers to communicate on a network such as the internet.

36
Q

Network Communications using the NetBIOS protocol

A

Ports 137, 138, and 139 (NetBIOS)

37
Q

A malicious attempt to disrupt the normal traffic of a targeted server, service or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic

38
Q

Spreads after a user takes some type of user action

39
Q

Measure encryption footprints. Attackers use footprints monitor system activity and to retrieve information that is actively being encrypted.

A

Side Channel Attacks

40
Q

Monitors the computer infrastructure on which it is installed, analyzing traffic and logging malicious behavior.

A

Host-Based IDS (HIDS)

41
Q

Detects malicious traffic on a network.

A

Network-Based IDS (NIDS)