Set 1 Flashcards
Backs up all files that have changed since the last full backup
Differential Backup
What is the OSI Layer does connection between applications on each computer?
Layer 5 (Session)
Default Subnet Mask for Class A Range
/8
255.0.0.0
Refers to the process of settings all data bits to zero, effectively erasing the data
Zeroization
How do worms spread from system to system?
Software Vulnerabilities/Exploits
What is the 3-way handshake?
SYN, SYN-ACK, ACK
Between client & server
Adverse
Preventing success or development; harmful
Set of guidelines or rules that dictate how access control should be implemented
Policy
Most common form of risk when buying insurance
Transference
What OSI Layer do TCP & UDP Operate at?
Layer 4 (Transport)
Provides automated log monitoring & analysis
Security Information and Event Management (SIEM) System
Allows owner of resource to configure access rules. Full control to configure what subjects can access the object
Discretionary Access Control (DAC)
An entity/resource that’s accessed by subject
Object
Regulate access based on security labels assigned by central authority. More commonly used in the military and government
Mandatory Access Control (MAC)
What is another name for host-based IDS/IPS products?
Endpoint Security Products
Default Subnet Mask for Class C Range
/24
255.255.255.0
Users, resources & environment conditions to make access decisions
Attribute-Based Access Control (ABAC)
Backs up all files that have changed since the last backup of any type
Incremental Backup
Management-oriented controls that provide directives and instruction aimed at people within the organization
Administrative
A list of all subjects and their respective permissions for a specific object
Access Control List (ACL)
What OSI Layer deal with transmitting & receiving bits?
Layer 1 (Physical)
What OSI Layer transmits & delivers frame throughout a LAN based on physical MAC addresses?
Layer 2 (Data Link)
Assigns access based on roles within an organization
Role-Based Access Control (RBAC)
Defines the conditions under which access is allowed/denied
Rule
Attack that uses a spoofed IP Address in the ICMP message so traffic is sent to the wrong location
Smurf Attack
Default Subnet Mask for Class B Range
/16
255.255.0.0
Stores all of the files on the system each time the backup process is run
Full Backup
Emails sent to specific individuals/employees of organizations
Spear Phishing
An entity that’s capable of accessing an object
Subject
What OSI Layer is responsible for routing and route selecting network packets on logical IP addresses?
Layer 3 (Network)
What logical address is assigned to devices connected to a network/Internet?
Internet Protocol (IP) Address
Used to map IP addresses to MAC addresses on a LAN
Address Resolution Protocol (ARP)
Network device used to enforce certain security rules that govern how traffic may flow
Network Firewall
Cloud provider gives customers self-service access to a pool of infrastructure resource (network, server, storage, etc.)
Infrastructure as a Service (IaaS)
Software service/application hosted by cloud provider and provided to customers
Software as a Service (SaaS)