Lecture 5 Flashcards

1
Q

What are the four types of threats that might arrive when a hacker gains access to the network?

A

Information Theft
Identity Theft
Data Loss / Manipulation
Disruption of Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the network security goals?

A

Confidentiality
Authentication
Message Integrity
Access and Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the CIA Triangle made up of?

A

Confidentiality
Integrity
Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is McCumber’s cube made up of?

A

Security Principles:
Confidentiality
Integrity
Availability

Information States:
Transmission
Storage
Processing

Countermeasures:
Technology
Policies & Practice
People

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does AAA stand for?

A

Authentication - verifies the ID of the user.

Authorization - Determines what resources an authenticated person is allowed to access.

Accounting - Keeps track of what the user is doing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is DAS?

A

Direct-Attached Storage, a USB or HDD.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is NAC?

A

Network access control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is VPN?

A

Virtual Private Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a DMZ?

A

Demilitarized Zone which allows for an internal server to be accessed from both internal and external networks. All inbound traffic is forwarded to this device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly