Test 3 Flashcards
the process for risk security management
risk id, assessment, treatment
Who often heads Cyber if they don’t have a dedicated CISO
CFO
DNS
53
Contactless Protocol?
UDP
Connection orinenteded protocol
TCP
Layers of the OSI model
- Application layer
- Presentation layer
- Session layer
- Transport layer
- Network layer
- Data link layer
- Physical layer
Soft controls aka
Administrative controls
buffer overflow
a programming error that allows an attacker to write to memory outside of the buffer
Class A noted in CIDR
/8
what do stakeholders do during IR
communication both internally and externally
another name for IDS and IPS
endpoint security products
simplest and least expensive firewall
packet filter
What assigns IPs
Dynamic Host Configuration Protocol (DHCP)
SLA
Service Level Agreement
Computer Virus
Malware that infects a legitimate program and causes it to preform a function it was not intended to do