Intro To Networking Chapter 9 Terms Flashcards

1
Q

a document that describes the rules governing access to an organization’s information resources, enforcement of these rules, and steps taken if rules are breached

A

Security Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Describes what staff, customers, and business partners can expect for monitoring and reporting network use.

A

Privacy policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Explains for what purposes network resources can be used.

A

Acceptable use policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Describes how users identify themselves to gain access to network resources. Logon names, password conventions, and authentication methods should be described.

A

Authentication policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Explains what constitutes proper or improper use of Internet resources.

A

Internet use policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Specifies how and when users are allowed to access network resources. Policies should exist for both onsite and remote access to the network.

A

Access policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Explains the manner in which security compliance or violations can be verified and the consequences for violations

A

Auditing policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Outlines the policies for backup procedures, virus protection, and disaster recovery.

A

Data protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

features such as data encryption, complex password requirements, detailed auditing and monitoring of computer and network access, intricate authentication methods, including multifactor authentication, and strict policies governing use of the Internet and e-mail.

A

Highly Restrictive Security Policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

require passwords for each user but not overly complex passwords. Auditing is geared toward detecting unauthorized logon attempts, misuse of network resources, and network attacker activity.

A

Moderately Restrictive Security Policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

simple or no passwords, unrestricted access to resources, and probably no monitoring and auditing.

A

Open Security Policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Identifying who’s permitted to access which network resources

A

Authentication and authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Making data unusable to anyone except authorized users

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Allowing authorized remote access to a private network via the public Internet

A

Virtual private networks (VPNs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Implementing measures for protecting data and authorizing access to a wireless network

A

Wireless security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Using a hardware device or software (including firewalls, intrusion detection and prevention systems, and content filters) that protects a computer or network from unauthorized access and attacks designed to cripple network or computer performance

A

Network security devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Securing data from software designed to destroy data or make computers and networks operate inefficiently

A

Malware protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

the authentication protocol used in a Windows domain environment to authenticate logons and grant accounts access to domain resources. An account can be a user or a computer because computers must also authenticate to the domain. _________ provides mutual authentication between a client and server or between two servers

A

Kerberos

19
Q

the identity of both parties is verified.

A

Mutual authentication

20
Q

industry-standard client/server protocol that centralizes authentication, authorization, and accounting (AAA) for a network.

A

Remote Authentication Dial-In User Service—RADIUS

21
Q

not a self-contained authentication protocol; rather, it’s a framework for other protocols that provide encryption and authentication.

A

Extensible Authentication Protocol

22
Q

Knowledge—What the user knows, such as a username and password

Possession—What the user has, or possesses, such as a smart card or key

Inherence—What the user is; a unique biometric identifying trait, such as a fingerprint, retina scan, or voice pattern

A

multifactor authentication (MFA)

23
Q

works by establishing an association between two communicating devices. An association is formed by two devices authenticating their identities via a preshared key, Kerberos authentication, or digital certificates.

A

IP Security (IPsec)

24
Q

a series of letters, numbers, and special characters, much like a password, that both communicating devices use to authenticate each other’s identity.

A

preshared key

25
Q

A commonly used VPN protocol in Windows OSs with client support for Linux and Mac OS X, too. Most OSs that support VPN clients support PPTP.

A

Point-to-Point Tunneling Protocol (PPTP)

26
Q

a VPN connection is established between two VPN devices

A

Site-to-site

27
Q

establishes a VPN connection between a single client computer and a VPN device

A

Client-to-site

28
Q

Attackers who drive around looking for wireless LANs (WLANs) to intercept

A

wardrivers.

29
Q

the boundary between your network and external networks such as the Internet

A

network perimeter

30
Q

a hardware device or software program that inspects packets going into or out of a network or computer, and then discards or forwards the packets based on a set of rules.

A

firewall

31
Q

a network device such as a server installed as a decoy to lure potential attackers.

A

honeypot

32
Q

virus
A malicious program that spreads by replicating itself into other programs or documents; it usually aims to disrupt computer or network functions by deleting and corrupting files.

A

virus

33
Q

a type of malware that doesn’t require another file to spread to other computers; it’s a self-contained program that just needs a computer to be connected to a network

A

worm

34
Q

a form of malware that can monitor traffic to and from a computer, monitor keystrokes, and capture passwords

A

rootkit

35
Q

a from of malware that appears to be something useful, such as a free utility, but in reality it contains some type of malware

A

trojan horse

36
Q

time-dependent malware that can come in different forms. Its main characteristic is that it’s activated when a particular event occurs, such as a specific date and time, or when a particular file is accessed

A

logic bomb

37
Q

a type of malware that monitors or controls part of your computer at the expense of your privacy and the gain of some third party.

A

Spyware

38
Q

unsolicited e-mail

A

Spam

39
Q

a security consultant who detects holes in a system’s security for the purpose of correcting these vulnerabilities.

A

penetration tester

40
Q

an automated method for pinging a range of IP addresses

A

ping scanner

41
Q

determines which TCP and UDP ports are available on a computer or device

A

port scanner

42
Q

a source address inserted into the packet that isn’t the sender’s actual address.

A

spoofed address

43
Q

Usually a component of a firewall, a hardware device or software that detects an attempted security breach and notifies the network administrator. An ——– can also take countermeasures to stop an attack in progress.

A

intrusion detection system (IDS)

44
Q

A variation of an IDS that can take countermeasures if an attack is in progress. See also intrusion detection system (IDS).

A

intrusion prevention system (IPS)