Terms you should know Flashcards

1
Q

Layer 2 device
aka multiport bridge
connects multiple network segments together
learns MAC addresses touching its ports
makes forwarding decisions like a bridge

A

switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Also known as a multiport repeater and a Layer 1 device that connects multiple network devices & workstations. Broadcasts data to every computer or Ethernet-based device connected to it & transmits data from one device to another in the form of frames.

A

Hub

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

This hub repeats signals with no amplification

A

passive hub

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

This hub repeats signals with amplification

A

active hub

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

This hub has enhanced features like SNMP (simple network management protocol, which allows you to actively control the hub and configure it from a distance)

A

smart hub

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Analyzes source MAC addresses and makes intelligent forwarding decisions based on the destination MAC frames. Connects two LANS and has packets processed on MAC addresses inside the incoming packet

A

Bridge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Measures how many bits the network can transmit per second.

A

Bandwidth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Layer 3 device that connects multiple networks & makes forwarding decisions based on logical information, helps connect to Internet & other networks, and is all about IP addresses. Also separates broadcast domains

A

Router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Transmit (a program or some information by radio or television)

A

Broadcast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Blank is the most common form of malware. It
is how most other malware gets delivered. Blank
occurs anytime you have something with a known, desired function as well as an unknown, undesired function. For example, think of a login screen you use to login to a computer. Say that in addition to logging you in, it also sends your username and password to an attacker. The
login function is the known and desired action. Sending your credentials to an attacker is the unknown and undesired action.

A

Trojan Horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Blank is also an all-in-one security
appliance. A perfect example of these devices is the “wireless router” we buy for our homes. While this device is indeed a router, it may also be a firewall, intrusion detection system (IDS), gateway anti-virus, dynamic host control protocol (DHCP) server, content filter, and many other
security mechanisms all inside one box.

A

Unified Threat Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Blank is the practice of leaving malicious USBs
around and waiting for someone to pick them up and try to use them. These USBs have autorun scripts on them that will automatically install malware on a system the instant they are plugged into a computer. (Note: Windows supports
autorun scripts, though the feature can be disabled. (Note: Windows supports
autorun scripts, though the feature can be disabled. Mac does not support autorun at all.)

A

USB Seeding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Blank is when a cybersecurity professional
employs the same tools and techniques (except destructive methods) as a hacker in an attempt to gain access to a network, building, etc. Two big differences between criminal hackers and Blank are:
* Contracts—Blank have extensive contracts with their customers that give the penetration tester permission to perform the attacks, list what they can and cannot do, etc.
* Cleanup—Good blanks always clean up after themselves. Some tests may leave accessible vulnerabilities on a network that require repair. Criminal hackers do not care about contracts, permission, or cleaning up after themselves. The other significant difference is that a criminal hacker tends to cost an organization a great deal more than blanks do.

A

Penetration Tester

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Blank is the process of identifying security weaknesses and flaws in systems and software running on them. This is an integral component of a Blank management program, which has one overarching goal – to protect the organization from breaches and the exposure of sensitive data

A

Vulnerability Scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

any circumstance or event that has the potential to compromise confidentiality, integrity, or availability.

A

Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The possibility or likelihood of a threat exploiting a vulnerability resulting in a loss.

A

Risk

17
Q

Blank is a risk-assessment approach that assigns
hard costs to each risk. The approach utilizes mathematical formulas to calculate single-loss expectancy, annual-loss expectancy, etc. The method lends itself to communicating risk to management and cost justification, but it is impossible to predict the true cost of future events accurately

A

Quantitative Risk

18
Q

the Quantity of Money

A

Quantitative Risk

19
Q

The Quality of the Risk.

A

Qualitative Risk

20
Q

Blank is implementation is when you place your
data on a cloud provider’s systems in such a way that they have “zero knowledge of your data.” To do this locally, you enter a very complex passphrase. That passphrase runs through a process to create an encryption key. The encryption key encrypts your data, and your encrypted data then uploads to the cloud provider. The cloud provider never has access to the passphrase or the encryption key the passphrase creates – hence they have zero knowledge of your data. At any time, you can enter the passphrase, download your data, and decrypt your data.

A

zero knowledge

21
Q

is a code that takes advantage of a software vulnerability or security flaw

A

Exploit

22
Q

Blank is an attack against a computer that is
only known by the person who discovered it. The person who discovered the attack or exploits has not notified the vendor, so they do not know to work on a solution. Since the public (including you) do not know about the attack, you do not know to protect yourself from it.
Blank have now become a commodity bought and sold on the dark web. Google, Microsoft, and other companies also have “bounty programs” that will pay for the disclosure of blank.

A

zero day exploit

23
Q

is a risk-assessment approach that
utilizes a team of subject-matter experts (SMEs) and questionnaires to rank each threat according to likelihood and impact. The answers from the SMEs go into a severity scale that helps the cybersecurity team to prioritize concerns and assign resources effectively. The method is
difficult to communicate the results to management, but it is very straightforward to perform

A

Qualitative Risk Assessment

24
Q

Blank is a mathematical formula (algorithm) run against an input file. It is used in cryptography to check the integrity of a message or a file. When you “hash a file”, you run the hashing algorithm against a computer file and receive a fixed-length output called a hash or fingerprint of the file. A
good hash algorithm provides all of the following:
* When you use the same algorithm, you always get the same length output, regardless of the size of input
* Every time you hash the exact same input, you get the
exact same output
* If you make even a tiny change to the input your output is completely different (called widely divergent)
* It is extremely fast to calculate a hash regardless of the size of the input
* It is mathematically impossible to use the output to recreate the input
* It is extremely unlikely that two different inputs will create the same output
* The blank algorithm does not modify the input in any way

A

Hash

25
Q

Any circumstance or event that has the potential to compromise confidentiality, integrity, or availability. Malware or a bank robber is an example of this

A

Threat

26
Q

A process used to identify and prioritize risks. It includes quantitative risk assessments and qualitative risk assessments

A

Rsik assessment

27
Q

The practice of identifying, monitoring, and limiting risks to a manageable level. It includes risk response techniques, qualitative risk assessments, and quantitative risk assessments.

A

Risk Management

28
Q

The process of reducing risk by implementing controls. Security controls reduce risk by reducing vulnerabilities associated with a risk, or by reducing the impact of a threat.

A

Risk Mitigation

29
Q

A tool used to detect vulnerabilities. A blank can typically identifies vulnerabilities, misconfigurations, and a lack of security controls. It passively tests security controls.

A

Vulnerability Scanner

30
Q

A weakness. It can be a weakness sin the hardware, the software, the configuration, or even the users operating the system.

A

Vulnerability

31
Q

Any circumstance or event that has the potential to compromise confidentiality, integrity, or availability

A

Threat

32
Q

The possibility or likelihood of a threat exploiting resulting in a loss

A

Risk