IS3220 CHAPTER 2 Flashcards
This is a port or portal authentication. A mechanism commonly used by network devices, such as firewalls, routers, switches, and wireless access points, to perform authentication of users before allowing communication to continue across or through the device. The authentication can take place locally on the device or go to and authentications service, such as a credit card payment system, PKI, or directory service. This is called ___?
802.1x
Malicious software programs distributed by hackers to take over control of victim’s computers. AKA bot or zombies. These are commonly used to construct botnets and are called ___?
AGENTS
The calculation of the total loss potential across a year for a given asset and a specific threat. This is called ___?
ANNUALIZED LOSS EXPECTANCY (ALE)
A probability prediction based on statistics and historical occurrences on the likelihood of how many times in the next year is a threat going to cause harm. This is called ___?
ANNUALIZED RATE OF OCCURRENCE (ARO)
A hardened hardware firewall is called an ___?
APPLIANCE FIREWALL
The top or seventh layer of the OSI model. This layer is responsible for enabling communications with host software, including the operating system. This layer is the interface between host software and the network protocol stack. the sub-protocols of this layer support specific applications or types of data and is called ___?
APPLICATION LAYER (LAYER 7)
A type of firewall that filters on a specific application’s content and session information is called ___?
APPLICATION PROXY/FIREWALL/GATEWAY
The cumulative value of an asset based on both tangible and intangible values. This supports the SLE calculation and is called ___?
ASSET VALUE (AV)
A firewall positioned at the initial entry point where a network interfaces with the Internet. It serves as the first line of defense for the network. AKA a sacrificial host and is called ___?
BASTION HOST
A description often applied to firewalls positioned on network zone transitions or gateway locations and is called ___?
BORDER SENTRY
A network of zombie/bot/agent-comprised systems controlled by a hacker is called ___?
BOTNETS
Malicious software programs distributed by hackers to take over control of victims’ computers. AKA agents or zombies. These are commonly used to construct botnets and are called ___?
BOTS
A logical connection between a client and a resource server. May exist at Layer 3, 4, or 5 of the OSI model. AKA session or a state and is called ___?
CIRCUIT
A filtering device that allows or denies the initial creation of a circuit, session, or state, but performs no subsequent filtering on the circuit once established and is called ___?
CIRCUIT PROXY/FIREWALL
A type of software product that is pre-compiled and whose source code is undisclosed is called ___?
CLOSED SOURCE
A firewall product designed for larger networks. Usually a commercial firewall is a hardware device and is called ___?
COMMERCIAL FIREWALL
A form of filtering that focuses on traffic content. Application proxies perform most of these and are called ___?
CONTENT FILTERING
The final equation of risk analysis to assess the relative benefit of a countermeasure against the potential annual loss of a given asset exposed to a specific threat is called ___?
COST/BENEFIT
The second layer of the OSI model responsible for physical addressing (MAC addresses) and supporting the network topology, such as Ethernet is called ___?
DATA LINK LAYER (LAYER 2)
A form of auto-initian switch that triggers when the ongoing prevention mechanism fails. These often include firewalls and hand grenades. If the firewall stops functioning, the connection is severed. This is called ___?
DEAD-MAN SWITCH
The action of processing the contents of a header, removing that header, and sending the remaining payload up to the appropriate protocol in the next higher layer in the OSI model is called ___?
DE-ENCAPSULATION
A firewall that has two network interfaces. Each network interface is located in a uniques network segment. This allows for true isolation of the segments and forces the firewall to filter all traffic moving from one segment to another and is called ___?
DUAL-HOMED FIREWALL
The process of automatically created temporary filters. In most cases, the filters allow inbound responses to previous outbound requests. AKA stateful inspection. This is called ___?
DYNAMIC PACKET FILTERING
The potential amount of harm from a specific threat stated as a percentage. Used in the calculation of SLE and is called ___?
EXPOSURE FACTOR (EF)
A failure response resulting in a secured or safe level of access or communication is called ___?
A failure response resulting in a secured or safe level of access communication is called ___?
(2 answers)
FAIL-SAFE
FAIL-SECURE
The process of inspecting content against a set of rules or restrictions to enforce allow-and-deny operations on the content. Firewalls and other security components use this. This is called ___?
FILTERING
A network security device or host software that filters communications, usually network traffic, is based on a set of predefined rules. Unwanted content is denied and authorized content is allowed. AKA a sentry device and is called ___?
FIREWALL
The collection of data at the Data Link layer (Layer 2) of the OSI model, defined by the Ethernet IEEE802.3 standard, that consists of a payload from the Network layer (Layer 3) to which an Ethernet header and footer have been attached is called ___?
FRAME
An entrance or exit point to a controlled space. A firewall is often positioned at the is of a network to block unwanted traffic and is called ___?
GATEWAY
The physical address assigned to a network interface by the manufacturer. AKA the MAC address is called ___?
HARDWARE ADDRESS
An appliance firewall. A hardened computer product that hosts firewall software exclusively is called ___?
HARDWARE FIREWALL
The additional data added to the front of a payload at each layer of the OSI model that includes layer-specific information is called ___?
HEADER
A software firewall installed on a client or server is called a ___?
HOST FIREWALL
These are not directly related to budgetary funds. They can include, but not limited to: research and development, marketing edge, competition value, first to market, intellectual property, public opinion, quality of service, name recognition, repeat customers, loyalty, honesty, dependability, assurance, reliability, trademarks, patents, privacy etc is called ___?
INTANGIBLE COST/VALUE
A commonly used protocol found in the Network layer (Layer 3). This rides as the payload of an IP packet. It supports network health and testing. commonly abused by hackers for flooding and probing attacks. This is called ___?
INTERNET CONTROL MESSAGE PROTOCOL (ICMP)
The temporary logical address assigned to hosts on a network. This is managed and controlled at the Network layer (Layer 3) of the OSI model and called ___?
IP ADDRESS
A temporarily assigned address given to a host. IP address is a common example of this. Most of these exist a the Network layer (Layer 3) of the OSI model. This is called ___?
LOGICAL ADDRESS
The physical address assigned to a network interface by the manufacturer. This is know as the Organizationally Unique Identifier (OUI) or vender ID, the last half is the unique serial number of the NIC and is called ___?
MAC ADDRESS
This is the third layer of the OSI model. This layer is responsible for logical address (IP addresses and routing traffic. This is called ___?
NETWORK LAYER (LAYER 3)
A type of software product that may or may not be pre-compiled and whose source code is freely disclosed and available for review and modification and is called ___?
OPEN SOURCE
This is a standard conceptual tool used to discuss protocols and their functions. It has seven layers. Each layer can communicate with its peer layer on the other end of a communication session. While this helps to discuss protocols, mow protocols are not in full compliance with it. This is called ___?
OPEN SYSTEM INTERCONNECTION REFERENCE MODEL (OSI MODEL)