Security Technologies Flashcards

1
Q

Virtual Network Computing (VNC) Port 5900

A

Designed for thin client architectures and things like Virtual Desktop
Infrastructure (VDI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Virtual Desktop Infrastructure (VDI)

A

▪ Hosts a desktop environment on a centralized server

▪ Desktop as a Service (DaaS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Virtual Private Networks (VPNs)

A

Extends a private network across a public network and enables sending and
receiving data across shared or public networks
▪ Site to site: corporate network and a branch office network
▪ Client to site: remote user to main office
▪ Clientless: creates secure remote access vpn tunnel with web browser / used for e-commerce

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Full Tunnel VPN

A

Routes and encrypts all network requests through the VPN connection
back to the headquarters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Split Tunnel VPN

A

Routes and encrypts only the traffic bound for the headquarters over the
VPN, and sends the rest of the traffic to the regular Internet
● For best security, use a full tunnel
● For best performance, use a split tunnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Clientless VPN

A

Creates a secure, remote-access VPN tunnel using a web browser without
requiring a software or hardware client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

IP Security (IPSec)

A

Provides authentication and encryption of data packets to create an secure
encrypted communication path between two computers
Provides CIA and Antireplay
IKE and Diffie Hellman Key Exchange

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Granular

A

Sent trap messages get a unique objective identifier to distinguish each
message as a unique message being received

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Management Information Base (MIB)

A

The structure of the management data of a device subsystem using a
hierarchical namespace containing object identifiers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

SNMPv3

A

Provides three security enhancements which added integrity,
authentication, and confidentiality to the SNMP protocol
Integrity, Authentication, PoE 802.3at

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

System Logging Protocol (Syslog)

A

Sends system log or event messages to a central server, called a syslog
server
Security Information Management (SIM)
Security Event Management (SEM)
Security Information and Event Management (SIEM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

SIEM Security Level 0

A

Emergency

The system has become unstable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

SIEM Security Level 1

A

Alert

A condition should be corrected immediately

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

SIEM Security Level 2

A

Critical

A failure in the systems primary application requires immediate attention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

SIEM Security Level 3

A

error

something is preventing proper system function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SIEM Security Level 4

A

warning

an error will occur if action is not taken soon

17
Q

SIEM Security Level 5

A

notice

the events are unusual

18
Q

SIEM Security Level 6

A

information

normal operational message that requires no action

19
Q

SIEM Security Level 7

A

debugging

useful information for developers

20
Q

Security Information and Event Management (SIEM)

A

Provides real-time or near-real-time analysis of security alerts generated by
network hardware and applications
Gathers logs and data from all sorts of different systems

21
Q

Traffic Log

A

Contains information about the traffic flows on the network

Traffic logs allow for investigation of any abnormalities

22
Q

Audit Log/ Audit Trail

A

Contains a sequence of events for a particular activity

23
Q

System Log

A

Contains information about the operating system itself