Objective 2 Flashcards

1
Q

Based on military principle more difficult for enemy to defeat complex and multi-layered defense system than to penetrate single barrier

A

Defense-In-Depth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Attempts to stop attacks before they happen

A

Protect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Assists in detecting ongoing attack

A

Detect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Helps successfully stop or deter attack

A

React

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the Defense-In-Depth categories?

A

Protect, Detect, and React

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does Defense-In-Depth need to balance?

A

People, Technology, and Operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Focuses on all elements required to sustain organization’s security posture a day-to-day basis

A

Operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Includes traffic analysis, monitoring unprotected communications, decrypting weakly encrypted traffic, and the capture of authentication information (e.g., passwords)

A

Passive Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Includes attempts to circumvent or break protection features, introduce malicious code, or steal or modify information

A

Active Attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Consists of regular individuals attaining close physical proximity to networks, systems, or facilities for purpose of modifying, gathering, or denying access to information

A

Close-in Attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Intentionally eavesdrop, steal or damage information, use information in fraudulent manner, or deny access to other authorized users

A

Malicious Insider Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Attacks typically result from carelessness, lack of knowledge, or intentional circumvention of security for such reasons as “getting the job done’’

A

Non-Malicious Insider Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Focuses on malicious modification of hardware or software at factory or during distribution

A

Distribution Attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Software or hardware-based network security system controlling incoming and outgoing traffic

A

Firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Technique used to control network access by monitoring outgoing and incoming packets and either allowing or blocking them

A

Packet Filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Network device or software acting on behalf of clients to retrieve requested content from an origin content server

A

Proxy Services

17
Q

An Internet standard, enabling a LAN to use one set of IP addresses for internal traffic and a second set for external traffic

A

Network Address Translation

18
Q

Process of monitoring network and computer systems for signs of incidents in violation of computer security policies

A

Intrusion Detection

19
Q

System scanning, auditing, and monitoring the security infrastructure for signs of attacks in progress

A

Intrusion Detection Systems

20
Q

Used to control, prevent, identify, and report vulnerabilities at host and network level

A

Internal Control

21
Q

Allows user to log into specific machine and allows access to resources on that machine only

A

Local User Account

22
Q

Valid on any computer in domain for which account was created

A

Domain User Account

23
Q

Controls access to object such as file or folder

A

Permissions

24
Q

Enables user account or group to perform predefined tasks

A

Rights

25
Q

Activities conducted to protect and defend friendly information and information systems

A

Defense Counter Information

26
Q

Measures and controls taken to deny unauthorized persons information derived from information systems of U.S. Government related to national security and to ensure authenticity of such information systems

A

Communications Security

27
Q

Protects information technology, its operating system,

peripherals, applications, and information contained against loss, misuse, unauthorized access, or modification

A

Computer Security

28
Q

Deny interception and exploitation of information by containing compromising emanations within an inspect-able space

A

Emissions Security

29
Q

Ensures only authorized users can gain access to workstations, applications, and networks

A

Access Control