Section 4 Security Applications and Devices Flashcards

1
Q

Software applications that protect a single computer from unwanted internet traffic (Host Based Firewalls)

A

Personal Firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Every windows computer has already a software based firewall built in and available. Two types included is a basic version and a more advanced version called the Windows Firewall with advanced security.

A

Windows Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Built in software firewall for Mac users. Basic version is accessed through the system preference panel.

A

OSX (Apple’s Firewall)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Can be configured through the command line using different accept and reject rules based upon the type of network traffic that’s expected and the part being utilized for that communication.

A

iptables (Linux Firewall)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Device or software application that monitors a system or network and analyzes the data passing through it in order to identify an incident or attack.

A

Intrusion Detection System (IDS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

This usually takes the form of a piece of software that’s installed on your computer or on a server and it will protect it.

A

HIDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A piece of hardware that is installed on your network and all the traffic that goes through the switch and then will receive a copy to be sent down the Network Intrusion Detection System.

A

NIDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A specific string of bytes triggers on alert.

A

Signature Based Detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Relies on specific declaration of the security policy.

A

Policy Based Detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Analyzes the current traffic against an established baseline and triggers on alert if outside the statistical average.

A

Anomaly Based Detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Blocking of external files containing JavaScript, images, or web pages, from loading in a browser.

A

Content Filters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Monitors the data of a system while in use, in transit, or at rest to detect attempts to steal the data.

A

Data Loss Prevention (DLP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Software based client that monitors the data in use on a computer and can stop a file transfer or alert on admin of the occurence.

A

Endpoint DLP System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Software or hardware based solution that is installed on the perimeter of the network to detect data in transit.

A

Network DLP System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Software installed on servers in the datacenter to inspect the data at rest.

A

Storage DLP System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Cloud software as a service that protects data being stored in cloud services.

A

Cloud DLP System

17
Q

Firmware that provides the computer instructions for how to accept input and send output.

A

Basic Input Output System (BIOS)

18
Q

Technical limitations placed on a system in regards to the utilization of USB storage devices and other removable devices.

A

Removable Media Controls

19
Q

Storage devices that connect directly to your organizations network.

A

Network Attached Storage (NAS)

20
Q

Network designed specifically to perform block storage functions that may consist of NAS devices.

A

Storage Area Network (SAN)

21
Q

Storage device that performs whole disk encryption by using embedded hardware.

A

Self Encryption Drive (SED)

22
Q

Chip residing on the motherboard that contains an encryption key.

A

Trust Platform Module (TPM)

23
Q

Symmetric key encryption that supports 128 bit and 256 bit keys.

A

Advanced Encryption Standard

24
Q

Physical devices that act as a secure crypto processor during the encryption process.

A

Hardware Security Module (HSM)

25
Q

Software capable of detecting and removing virus infections and (in most cases) other types of malware, such as worms, trojans, rootkits, adware, spyware, password crackers, network mappers, DoS tools and others.

A

Anti-Virus (AV)

26
Q

A type of IDS or IPS that monitors as computer system for unexpected behavior or drastic changes to the system’s state on an endpoint.

A

Host Based IDS/IPS (HIDS/HIPS)

27
Q

A software agent that collects system data and logs for analysis by monitoring system to provide early detection of threats.

A

Endpoint Detection and Response (EDR)

28
Q

A system that can provide automated identification of suspicious activity by user accounts and computer hosts.

A

User and Entity Behavior Analytics (UEBA)