Objective 2 Flashcards

(29 cards)

1
Q

Based on military principle more difficult for enemy to defeat complex and multi-layered defense system than to penetrate single barrier

A

Defense-In-Depth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Attempts to stop attacks before they happen

A

Protect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Assists in detecting ongoing attack

A

Detect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Helps successfully stop or deter attack

A

React

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the Defense-In-Depth categories?

A

Protect, Detect, and React

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does Defense-In-Depth need to balance?

A

People, Technology, and Operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Focuses on all elements required to sustain organization’s security posture a day-to-day basis

A

Operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Includes traffic analysis, monitoring unprotected communications, decrypting weakly encrypted traffic, and the capture of authentication information (e.g., passwords)

A

Passive Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Includes attempts to circumvent or break protection features, introduce malicious code, or steal or modify information

A

Active Attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Consists of regular individuals attaining close physical proximity to networks, systems, or facilities for purpose of modifying, gathering, or denying access to information

A

Close-in Attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Intentionally eavesdrop, steal or damage information, use information in fraudulent manner, or deny access to other authorized users

A

Malicious Insider Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Attacks typically result from carelessness, lack of knowledge, or intentional circumvention of security for such reasons as “getting the job done’’

A

Non-Malicious Insider Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Focuses on malicious modification of hardware or software at factory or during distribution

A

Distribution Attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Software or hardware-based network security system controlling incoming and outgoing traffic

A

Firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Technique used to control network access by monitoring outgoing and incoming packets and either allowing or blocking them

A

Packet Filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Network device or software acting on behalf of clients to retrieve requested content from an origin content server

A

Proxy Services

17
Q

An Internet standard, enabling a LAN to use one set of IP addresses for internal traffic and a second set for external traffic

A

Network Address Translation

18
Q

Process of monitoring network and computer systems for signs of incidents in violation of computer security policies

A

Intrusion Detection

19
Q

System scanning, auditing, and monitoring the security infrastructure for signs of attacks in progress

A

Intrusion Detection Systems

20
Q

Used to control, prevent, identify, and report vulnerabilities at host and network level

A

Internal Control

21
Q

Allows user to log into specific machine and allows access to resources on that machine only

A

Local User Account

22
Q

Valid on any computer in domain for which account was created

A

Domain User Account

23
Q

Controls access to object such as file or folder

24
Q

Enables user account or group to perform predefined tasks

25
Activities conducted to protect and defend friendly information and information systems
Defense Counter Information
26
Measures and controls taken to deny unauthorized persons information derived from information systems of U.S. Government related to national security and to ensure authenticity of such information systems
Communications Security
27
Protects information technology, its operating system, | peripherals, applications, and information contained against loss, misuse, unauthorized access, or modification
Computer Security
28
Deny interception and exploitation of information by containing compromising emanations within an inspect-able space
Emissions Security
29
Ensures only authorized users can gain access to workstations, applications, and networks
Access Control