Understanding Devices and Infrastructure (Ch. 3) Flashcards

1
Q

A table or data file that specifies whether a user or group has access to a specific resource on a computer or network.

A

access control list (ACL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The point at which access to a network is accomplished, typically via wireless technology.

A

access point (AP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A response generated in real time.

A

active response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A notification that an unusual condition exists and should be investigated.

A

alarm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An indication that an unusual condition could exist and should be investigated.

A

alert

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An appliance that performs multiple functions.

A

all-in-one appliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The component or process that analyzes the data collected by the sensor.

A

analyzer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Variations from normal operations.

A

anomalies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

An anomaly-detection intrusion detection system works by looking for deviations from a pattern of normal network traffic.

A

anomaly-detection IDS (AD-IDS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A freestanding device that operates in a largely self-contained manner.

A

appliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A device or software that recognizes application-specific commands and offers granular control over them.

A

application-level proxy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

An IPSec header used to provide connectionless integrity and data origin authentication for IP datagrams and to provide protection against replays.

A

Authentication Header (AH)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A method of balancing loads and providing fault tolerance.

A

clustering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Gap controls that fill in the coverage between other types of vulnerability mitigation techniques

A

compensating controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Any systems that identify, monitor, and protect data to prevent it from unauthorized use, modification, destruction, egress, or exfiltration from a location.

A

data loss prevention (DLP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

An IPSec header used to provide a mix of security services in IPv4 and IPv6. ESP can be used alone or in combination with the IP Authentication Header (AH).

A

Encapsulating Security Payload (ESP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The process of enclosing data in a packet.

A

encapsulation

18
Q

An event that should be flagged but isn’t.

A

false negative

19
Q

A flagged event that isn’t really an event and has been falsely triggered.

A

false positive

20
Q

A combination of hardware and software filters placed between trusted and untrusted networks intended to protect a network from attack by hackers who could gain access through public networks, including the Internet.

A

firewall

21
Q

An intrusion detection system that is host based. An alternative is an intrusion detection system that is network based.

A

host-based IDS (HIDS)

22
Q

A software or appliance stand-alone used to enhance security and commonly used with PKI systems.

A

HSM (hardware security module)

23
Q

A condition that states that unless otherwise given, the permission will be denied.

A

implicit deny

24
Q

A set of protocols that enable encryption, authentication, and integrity over IP.

A

Internet Protocol Security (IPSec)

25
Q

Tools that identify attacks using defined rules or logic and are considered passive.

A

intrusion detection system (IDS)

26
Q

Tools that respond to attacks using defined rules or logic and are considered active.

A

intrusion prevention system (IPS)

27
Q

The management of all aspects of cryptographic keys in a cryptosystem, including key generation, exchange, storage, use, destruction and replacement.

A

key management

28
Q

Dividing a load for greater efficiency of management among multiple devices.

A

load balancing

29
Q

The set of standards defined by the network for clients attempting to access it.

A

network access control (NAC)

30
Q

An intrusion prevention system that is network based.

A

network intrusion prevention system (NIPS)

31
Q

attaches the system to a point in the network where it can monitor and report on all network traffic.

A

network-based IDS (NIDS)

32
Q

A nonactive response, such as logging.

A

passive response

33
Q

A type of system that prevents direct communication between a client and a host by acting as an intermediary.

A

proxy

34
Q

A proxy server that also acts as a firewall, blocking network access from external networks.

A

proxy firewall

35
Q

A type of server that makes a single Internet connection and services requests on behalf of many users.

A

proxy server

36
Q

A protocol that secures messages by operating between the Application layer (HTTP) and the Transport layer.

A

Secure Sockets Layer (SSL)

37
Q

provide real-time analysis of security alerts.

A

SIEM Security information and event management (SIEM)

38
Q

A system that acts based on the digital signature it sees and offers no repudiation to increase the integrity of a message.

A

signature-based system

39
Q

An access point’s broadcasting of the network name.

A

SSID broadcast

40
Q

Inspections that occur at all levels of the network and provide additional security using a state table that tracks every communications channel.

A

stateful inspection

41
Q

A network device that can replace a router or hub in a local network and get data from a source to a destination. Switching allows for higher speeds.

A

switch