Practice Test B Flashcards
UTM
Unified Threat Management. This is an appliance that acts as a traditional firewall. It is commonly located in the core of the network. It watches traffic flows across a network.
WAF
Web Application Firewall. A firewall for web-based applications. Commonly used to protect against application attacks such as injections, cross site scripting, and invalid input types.
Trunking
A technique used to send data from multiple VLANs across a single cable. Typically done by adding a VLAN header to the frame.
IPsec
A protocol suite used to create an encrypted tunnel between sites or end points. Used to create a VPN.
RAID
Redundant Array of Independent Disks is a data storage technology that combines multiple physical disk drives into logical units to improve performance and data redundancy
SDN
Software-Defined Networking. This separates the control plane of devices from the data plane, allowing for more automation and dynamic changes to the infrastructure.
Incident Response Process
Preparation > Detection > Analysis > Containment > Eradication > Recovery > Lessons Learned
Exposure Factor
Describes the loss of value to an organization if a security event occurs.
HIPS
Host Based Intrusion Protection System. It monitors device traffic, and hardware to look for known attack patterns as well as abnormal activity