Terms you should know Flashcards
Layer 2 device
aka multiport bridge
connects multiple network segments together
learns MAC addresses touching its ports
makes forwarding decisions like a bridge
switch
Also known as a multiport repeater and a Layer 1 device that connects multiple network devices & workstations. Broadcasts data to every computer or Ethernet-based device connected to it & transmits data from one device to another in the form of frames.
Hub
This hub repeats signals with no amplification
passive hub
This hub repeats signals with amplification
active hub
This hub has enhanced features like SNMP (simple network management protocol, which allows you to actively control the hub and configure it from a distance)
smart hub
Analyzes source MAC addresses and makes intelligent forwarding decisions based on the destination MAC frames. Connects two LANS and has packets processed on MAC addresses inside the incoming packet
Bridge
Measures how many bits the network can transmit per second.
Bandwidth
Layer 3 device that connects multiple networks & makes forwarding decisions based on logical information, helps connect to Internet & other networks, and is all about IP addresses. Also separates broadcast domains
Router
Transmit (a program or some information by radio or television)
Broadcast
Blank is the most common form of malware. It
is how most other malware gets delivered. Blank
occurs anytime you have something with a known, desired function as well as an unknown, undesired function. For example, think of a login screen you use to login to a computer. Say that in addition to logging you in, it also sends your username and password to an attacker. The
login function is the known and desired action. Sending your credentials to an attacker is the unknown and undesired action.
Trojan Horse
Blank is also an all-in-one security
appliance. A perfect example of these devices is the “wireless router” we buy for our homes. While this device is indeed a router, it may also be a firewall, intrusion detection system (IDS), gateway anti-virus, dynamic host control protocol (DHCP) server, content filter, and many other
security mechanisms all inside one box.
Unified Threat Management
Blank is the practice of leaving malicious USBs
around and waiting for someone to pick them up and try to use them. These USBs have autorun scripts on them that will automatically install malware on a system the instant they are plugged into a computer. (Note: Windows supports
autorun scripts, though the feature can be disabled. (Note: Windows supports
autorun scripts, though the feature can be disabled. Mac does not support autorun at all.)
USB Seeding
Blank is when a cybersecurity professional
employs the same tools and techniques (except destructive methods) as a hacker in an attempt to gain access to a network, building, etc. Two big differences between criminal hackers and Blank are:
* Contracts—Blank have extensive contracts with their customers that give the penetration tester permission to perform the attacks, list what they can and cannot do, etc.
* Cleanup—Good blanks always clean up after themselves. Some tests may leave accessible vulnerabilities on a network that require repair. Criminal hackers do not care about contracts, permission, or cleaning up after themselves. The other significant difference is that a criminal hacker tends to cost an organization a great deal more than blanks do.
Penetration Tester
Blank is the process of identifying security weaknesses and flaws in systems and software running on them. This is an integral component of a Blank management program, which has one overarching goal – to protect the organization from breaches and the exposure of sensitive data
Vulnerability Scan
any circumstance or event that has the potential to compromise confidentiality, integrity, or availability.
Threat