IS3220 CHAPTER 1 Flashcards
The process or mechanism of granting or denying use of a resource; typically applied to users or generic network traffic is called ___?
ACCESS CONTROL
A hardware product that is dedicated to a single primary function. The operating system or firmware of the hardware device is hardened and its use is limited to directly and only supporting the intended function. Firewalls, routers, and switches are typical ___?
APPLIANCE
Anything you use in a business process to accomplish a business task is considered an ___?
ASSET
This can be the action of a system that is recording user activity and system events into a log. It can also be the action of one who checks for compliance with security policies and other regulations and is called the act of ___?
AUDITING
Either an outside consultant or an internal member of the Information Technology staff. They perform security audits, confirms that the checking is sufficient, and investigates trails produced by system checks. In the case of regulatory compliance, they should be external and independent of the organization. This person/position is called ___?
AUDITOR
The process of confirming the identity of a user. It is also know as logon and is called ___?
AUTHENTICATION
Defining what users are allowed and not allowed to do. This is also known as access control and is called ___?
AUTHORIZATION
When a system is usable for its intended purpose. The security service that supports access to resources in a timely manner. If availability becomes compromised, a denial of service is taking place and is called ___?
AVAILABILITY
This is any access method or pathway that circumvents access or authentication mechanisms or unauthorized access to a system is called ___?
BACKDOOR
A type of filtering in which all activities or entities are permitted except for those on a ___?
BLACK LIST
Any restriction on the performance of a system. Can be caused by a slower component or pathway with insufficient throughput. It causes other components of system to work slower than their optimum rate and is called ___?
BOTTLENECK
Any compromise of security. Any violation of a restriction or rule whether caused by an authorized user or an unauthorized outsider is called ___?
BREACH
A network device that forwards traffic between networks based on the MAC address of the Ethernet frame. It forwards only packets whose destination address is on the opposing network and is called ___?
BRIDGE
Any activity necessary to meet an organization’s long-term goals. These are assigned to employees and other authorized personnel via their job description and is called ___?
BUSINESS TASK
Specifically, this is a proxy server and is the retention of Internet content. Various internal clients may access this content and provide it to subsequent requesters without the need to retrieve the same content from the Internet repeatedly and is called ___?
CACHING
Similar to a bottleneck, but deliberately created within a network infrastructure. It is a controlled pathway through which all traffic must cross. At this point, filtering to block unwanted communication or monitoring can occur and is called ___?
CHOKE POINT
This is a host on a network. It is the computer system, which supports user interaction with the network. Users employ this to access resources from the network. Users can also employ this generically as any hardware or software product to access a resource. This is called a ___?
CLIENT
A form of network where certain computers are designated as “servers” to host resources shared with the network. The remaining computers are designated as this to enable users to access shared resources. Most ___ employ directory services and single sign-on.
CLIENT/SERVER NETWORK
The security service of preventing access to resources by unauthorized users, while supporting access to authorized users is called ___?
CONFIDENTIALITY
A tactic of protection involving multiple layers or levels of security components. Based on the idea that multiple protections create a cumulative effect that will require an attacker to breach all layers, not just one is called ___?
DEFENSE IN DEPTH
A type of perimeter network used to host resources designated as accessible by the public from the Internet is called ___?
DEMILITARIZED ZONE (DMZ)
A form of attack that attempts to compromise availability. These attacks are usually of two types: flaw exploitation and flooding and is called ___?
DENIAL OF SERVICE (DoS)
A network service that maintains a searchable index or database of network hosts and shared resources. Often based on a domain name system and an essential service of large networks is called ___?
DIRECTORY SERVICES
A client/server network managed by a directory service is called ___?
DOMAIN
A network service that resolves FQDNs into their corresponding IP address. This is an essential service of most networks and their directory services and is called ___?
DOMAIN NAME SYSTEM (DNS)
Any planned or unplanned period when a network service or resource is not available. This can be caused by attack, hardware failure, or scheduled maintenance. Most organizations strive to minimize this through security and system management is called ___?
DOWNTIME
Filtering traffic as it attempts to leave a network, which can include monitoring for spoofed addresses, malformed packets, unauthorized ports and protocols, and blocked destinations is called ___?
EGRESS FILTERING
The process of enclosing or encasing one protocol or packet inside another protocol or packet. Also know as “tunneling.” This allows for communications to cross intermediary networks that might be incompatible with the original protocol and is called ___?
ENCAPSULATION
The process of converting original data into a chaotic and unusable form to protect it from unauthorized third parties is called __?
ENCRYPTION
An attack tool, method or technique a hacker uses to take advantage of a known vulnerability or flaw in a target system is called ___?
EXPLOIT
A type of perimeter network used to host resources designated as accessible to a limited group of external entities, such as business partners or suppliers, but not by the public. Often, access to this requires the use of a virtual private network or VPN, especially when access originates from the Internet and is called ___?
EXTRANET
The process of inspecting content against a set of rules or restrictions to enforce allow-and-deny operations on that content. Firewalls and other security components use filtering is called ___?
FILTERING
A network security device or host software that filters communications, usually network traffic, based on a set of predefined rules. Unwanted content is denied and authorized content is allowed. Also known as a sentry device is called ___?
FIREWALL
A complete Internet host name including a top level domain name, registered domain name, possibly one or more sub-domain names, and a host name and is called ___?
FULLY QUALIFIED DOMAIN NAME (FQDN)
A person who performs hacking. Modern use of this term now implies malicious or criminal intent by the hacker, although criminals are more correctly known as “crackers.” This is called a ___?
HACKER
The act of producing a result not intended by the designer of a system. Hackers may perform such acts out of curiosity or malice and is called ___?
HACKING
The process of securing or locking down a host against threats and attacks. This can include removing unnecessary software, installing updates, and imposing secure configuration settings is called ___?
HARDENING
This attack occurs when a hacker uses a network sniffer to watch a communications session to learn its parameters. Then disconnects one of the session’s hosts. Impersonates the offline system, and then begins injecting crafted packets into the communication stream. If successful, the person takes over the session of the offline host, while the other host is unaware of the switch is called ___?
HIJACKING
A node that has a logical address assigned to it, usually an IP address. This typically implies that the node operates at and/or above the network layer. This would include clients, servers, firewalls, proxies, and even routers. This excludes switches, bridges, and other physical devices such as repeaters and hubs and is called a ___?
HOST
A static file on every IP enabled host where FDQN to IP address resolutions can be hard coded and is called ___?
HOSTS FILE
Filtering traffic as it attempts to enter a network. This can include monitoring for spoofed addresses, malformed packets, unauthorized ports and protocols, and blocked destination is called ___?
INGRESS FILTERING
The security service of preventing unauthorized changes to data is called ___?
INTEGRITY
A security mechanism to detect unauthorized user activities, attacks, and network compromise. It can respond in a passive manner through alerts and logging or in an active manner by disconnecting session is called ___?
INTRUSION DETECTION SYSTEM (IDS)
A security mechanism to detect and prevent attempts to breach security is called ___?
INTRUSION PREVENTION SYSTEM (IPS)
IP protocol encryption services extracted from IPv6 to be used as an add-on component for IPv4. This provides tunnel mode and transport mode encrypted network layer connections between hosts and/or networks is called ___?
IPSEC
An essential part of security and an extension of the written security policy. This defines the business tasks for each person within the organization. This in turn prescribes the authorization personnel need to accomplished these assigned tasks is called ___?
JOB DESCRIPTION