Seriously, Ariel Flashcards
Pen Testing
the practice of testing a computer system, network, or web application to find security vulnerabilities that an attacker could exploit. Penetration testers only do this with permission of the organization that owns the system, network, or web application and within the bounds of their scope of work.
Fiber light meter
AKA optical power meter
used to measure the power in an optical signal over a fiber optic cable
A fiber light meter could be used to test if the cable is broken, but it would not be able to determine where the break in the fiber cable is located
OTDR
Optical Time Domain Reflectometer
used by organizations to certify the performance of new fiber optics links and detect problems with existing fiber links. An OTDR can identify if a fiber cable is broken and provide an approximately location for the break
Cable tester
cable tester is used to verify the electrical connections in a twisted pair or coaxial cable
Loopback adapter
plug that is used to test the physical port or interface on a network device
Media converter
a Layer 1 device that changes one type of physical network connection to another
incident response plan
a set of instructions to help our network and system administrators detect, respond to, and recover from network security incidents. These types of plans address issues like cybercrime, data loss, and service outages that threaten daily work
System life cycle plan
AKA life cycle planning
describes the approach to maintaining an asset from creation to disposal. In the information technology world, we normally have a 5-phase lifecycle that is used for all of our systems and networks: Planning, Design, Transition, Operations, and Retirement
AUP
acceptable use policy
set of rules applied by the owner, creator, or administrator of a network, website, or service, that restrict the ways in which the network, website, or system may be used and sets guidelines as to how it should be used
BYOD Policy
A bring your own device policy allows, and sometimes encourages, employees to access enterprise networks and systems using personal mobile devices such as smartphones, tablets, and laptops.
Least privilege
the concept and practice of restricting access rights for users, accounts, and computing processes to only those resources absolutely required to perform routine, legitimate activities.
Zero trust
a security framework that requires all users, whether in or outside the organization’s network, to be authenticated, authorized, and continuously validated for security configuration and posture before being granted or keeping access to applications and data.
Giant
any ethernet frame that exceeds the 802.3 frame size of 1518 bytes
Runt
an ethernet frame that is less than 64 bytes in size
Encapsulation
a process by which a lower-layer protocol receives data from a higher-layer protocol and then places the data into the data portion of its frame
CRC
Cyclic Redundancy Checksum
error-detecting code commonly used in digital networks and storage devices to detect accidental changes to raw data as it transits the network
Channel Bonding
a practice commonly used in IEEE 802.11 implementations in which two adjacent channels within a given frequency band are combined to increase throughput between two or more wireless devices
Broadcast
IPv4 only
Broadcast communication has one sender, but it sends the traffic to every device on the network
Anycast
IPv6 only
communications are sent to the nearest receiver in a group of receivers with the same IP
Multicast
a technique used for one-to-many communication over an IP network. The central location sends a signal to subscribed devices.
Unicast
communication only has one sender and one receiver
DLP
Data Loss Prevention
systems are used to ensure that end-users do not send sensitive or critical information outside the corporate network. These DLP products help a network administrator control what data end users can transfer
PaaS
Platform as a Service
a complete development and deployment environment in the cloud, with resources that enable you to deliver everything from simple cloud-based apps to sophisticated, cloud-enabled enterprise applications.
IaaS
Infrastructure as a Service
a type of cloud computing service that offers essential compute, storage, and networking resources on-demand, on a pay-as-you-go basis