CYBR perimeter defense

This class was created by Brainscape user kevin stapleton. Visit their profile to learn more about the creator.

Decks in this class (83)

1-1
A network is a way for __________...,
Individula machines are connected...,
To connect multiple machines toge...
15  cards
1-2
Public ip addresses are like mode...,
Using a nat a router takes a priv...,
Subnetting is simply chopping up ...
15  cards
1-3
A check of a systems security usu...,
The process of verifying that a u...,
Numbers that use the base 2 numbe...
13  cards
1-4
An approach to security that awai...,
A security approach that is conce...,
Someone who hacks into phone systems
13  cards
1-5
When set to 1 the device should u...,
An email client will use _______ ...,
Advantage of _____ over pop3 is t...
16  cards
1-6
Http displays ________ using port...,
Pop3 ______ email on port ________,
Nntp stands for ________ used by ...
15  cards
1-7
After data leaves the netowrk the...,
The view point of if our computer...,
Most attacks can be categorized i...
15  cards
1-8
Has become the most common form o...,
First risk factor of an attack,
Second risk factor of an attack
16  cards
2-1
Any attack that aims to deprive l...,
Many experts feel the __________ ...,
The underlying concept behind any...
16  cards
2-2
The code for a program or the act...,
A dos attack launched from multip...,
A specialized type of ddos that u...
17  cards
2-3
The popularity for the syn flood ...,
Defense using ________ seeks to a...,
Instead of allocating a complete ...
14  cards
2-4
A smurf atack is clever and simpl...,
You can protect agains a smurf at...,
Using _______ serves is critical ...
15  cards
2-5
Simple tool to use you select the...,
First appeared in july 2012 affec...,
First appeared in 2012 targets wi...
14  cards
2-6
Essentially a technique used by h...,
These often mask the actual ip ad...,
The intruder sends messages to a ...
16  cards
2-7
Microsoft office has been created...,
After a virus is on a system it c...,
An older virus with a multi modal...
15  cards
2-8
0  cards
3-1
A single point of contact between...,
A firewall that authenticates eac...,
A firewall type consisting of two...
15  cards
3-2
Free packet filtering app for lin...,
This product is inexpensive and a...,
This proiduct is reasonably price...
15  cards
3-3
Most quality firewalls today use ...,
Spi derives form the fact that in...,
Makes a number of different spi f...
15  cards
3-4
Has a robust app gateway,
Technologies offers several firew...,
Also provides an application gate...
15  cards
3-5
Typically web email and ftp serve...,
A firwall running on a server wit...,
Most firewalls today are implemen...
12  cards
4-1
A firewall type that verifies spe...,
A replacement technology for prox...,
A firewall that resides on a sing...
15  cards
4-2
Beginning with windows______ fire...,
You can set rules for individual ...,
You can set up rules for three ar...
15  cards
4-3
To list the current iptables rule...,
To allow communication on a speci...,
Or prehaps you need to allow all ...
17  cards
4-4
Norton firewall inlcudes festures...,
2016 version of the norton firewa...,
Macafee personal firewall is now ...
15  cards
4-5
Medium sized networks generally b...,
A well known manufacturer of secu...,
Check point firewall model series...
5  cards
5-1
An intrusion detection strategy t...,
Blocking all traffic from a suspe...,
A type of intrusion detection str...
17  cards
5-2
There are 6 basic approaches to i...,
When ids was first developed ____...,
With a hub a packet is sent from ...
15  cards
5-3
A message from the analyzer indic...,
The part of the ids used to manage,
The process or method by with the...
15  cards
5-4
A software honeypot solution comp...,
Specter works by runnning a numbe...,
Specter logs all trafficto the se...
14  cards
6-1
A modern symetric cipher that is ...,
Numeric codes used to represent a...,
Operations on base 2 binary numbe...
20  cards
6-2
Oldest recorded encryption method...,
The most common single letter wor...,
A single substitution cipher wher...
15  cards
6-3
Binary encryption does not work w...,
The following websites offer more...,
This refers to the method where t...
16  cards
6-4
4 rounds that are part of the 256...,
The round key are derived from th...,
This will only execurte the addro...
17  cards
6-5
Public key method developed in 77...,
A public key encryption method me...,
Rsa is much ______ than symetric ...
16  cards
6-6
___________ is not used to ensure...,
An international standard for the...,
The contents of the x509 are
15  cards
6-7
Is not a specific algorithm but r...,
This is a function that takes a v...,
Hashes are stored in you pc _____...
13  cards
6-8
Popular password cracker for both...
1  cards
7-1
A field that immediately follows ...,
An agency authorized to issue dig...,
Challenge handshake authenticatio...
16  cards
7-2
Policies that determine the param...,
This attack involves recoding the...,
A somewhat older connection protocol
16  cards
7-3
What 2 technologies to authentica...,
Designed to work with pptp and is...,
Is actuially a 3 part handshake a...
15  cards
7-4
Kerberos terms the ticket that is...,
Kerberos terms used to authentica...,
Kerberos terms temporary encrypti...
16  cards
7-5
Provides a framework for authenti...,
The first exchange between vpn en...,
Once the ike sa is established ip...
14  cards
8-1
Policies regarding account settings,
An administrator option either to...,
Also known as efs this is microso...
17  cards
8-2
When adding a new user give the a...,
Security policies refers to _____...,
Default passwords are not
15  cards
8-3
A branch contains all of your fil...,
This branch links to the section ...,
This branch contains computer spe...
15  cards
8-4
This shows all services installed...,
In windows 7 and beyond more info...,
_________ uneeded srvicesis an es...
15  cards
8-5
All services or daemons in linux ...,
The __________ must be configures...,
No application should run as ____...
6  cards
9-1
A hole in the security system del...,
Software that is self replicating...,
A virus that can spread without h...
16  cards
9-2
____________ virus hoax used an e...,
Jdbgmgrexe is actually the micros...,
This hoax showed up in 2003 via e...
15  cards
9-3
Virus scanners employ new methods...,
Some virus scanners examine the e...,
This form of scanning uses rules ...
15  cards
9-4
If the infection is in the subnet...,
If servers with sensative informa...
2  cards
10-1
A small file containing data that...,
A type of trojan horse that anoth...,
A list of entities together with ...
15  cards
10-2
A malware that targets android de...,
Another android trojan horse disc...,
Developed by a private company bu...
13  cards
10-3
Trojan horse port number for netr...,
Trojan horse port number for back...,
Trojan horse port number for yet ...
14  cards
10-4
This is a spyware not adware load...,
There are 2 issues with redsherif,
This product is available from we...
7  cards
11-1
Policies regarding how many login...,
A policy in which the company pro...,
A policy of permitting employees ...
15  cards
11-2
You should never open an attachme...,
It is recommended that all instan...,
Limmiting an organizations instan...
15  cards
11-3
The nature of it is ________ so i...,
A change control request should h...,
You must have some sort of plan f...
15  cards
11-4
0  cards
12-1
Ensuring that the contents of mes...,
One who breaks into a system in o...,
Assessing the security of a syste...
15  cards
12-2
Transferring the risk to someone ...,
If the probability of the risk is...,
A rating system based on attracti...
15  cards
12-3
___________ have built in firewal...,
Another phase of assessing system...,
Ids are the only way to know of i...
15  cards
12-4
Old toolthat has been popular for...,
Three classes of attacks,
An attack simply reports that hos...
16  cards
12-5
This is another eay to use scanni...,
Reports all open tcp ip and udp p...,
A windows program that will show ...
14  cards
13-1
An information barrier preventing...,
One of the oldest security models...,
An older security model with simi...
16  cards
13-2
A framework that can be effective...,
First released in 1996 published ...,
The current version of cobit has ...
15  cards
13-3
Mist sp 800 35 is an overview of ...,
Nist sp 800 30 rev 1 guide for co...,
_________ is the unified informat...
16  cards
13-4
The _____ shall support a trusted...,
The ______ shall immediuatly noti...,
__________ includes everything in...
15  cards
13-5
Guidelines for understanding trus...,
Writing trusted facuility manuals,
A guide to understanding identifi...
14  cards
13-6
This is a document created by a u...,
This is a document created by the...,
Specify individuals security func...
18  cards
13-7
0  cards
14-1
A sudden and unlintended failure ...,
Transaction in which users cannon...,
A security mechanism in high secu...
14  cards
14-2
A plan in place to guide the retu...,
This plan must include personnel ...,
In a drp specific people are assi...
11  cards
15-1
Short for system administrator,
Hacking with malicious intent,
The most widely used port scannin...
15  cards
14-3
Stripped disks distribures data a...,
Mirroring the contents of the dis...,
Striped disks and designated pari...
6  cards
15-2
0  cards
16-1
The electronic evidence as eviden...,
The eu has 5 principles that esta...,
Written by scientific working gro...
16  cards
16-2
Contains various events logged by...,
This log contains events logged b...,
This log is used to store events ...
14  cards
16-3
The ___________ command lists any...,
This is a command useful for find...,
___ is a command you can use with...
17  cards
16-4
Removable chip heart of the phone...,
Puk,
Usually a 15 digit number but can...
11  cards
16-5
Cert from the ec council tests ge...,
Cert from iacis general knowledge...,
Has a number of forensics certs i...
3  cards
17-1
Terrorisms using computers comput...,
A tool used to execute ddos,
An attempt to acquire information...
12  cards

More about
CYBR perimeter defense

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study kevin stapleton's CYBR perimeter defense flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

Unit 1-B Land, Development And Zoning...
  • 6 decks
  • 41 flashcards
  • 1 learners
Decks: 1 Land Development Terminologies, 11 Zoning, Planned Communities, And more!
Host and Defense
  • 17 decks
  • 1892 flashcards
  • 7 learners
Decks: Week 1, Week 2, Week 3, And more!
Area and perimeter
  • 1 decks
  • 15 flashcards
  • 19 learners
Decks: Area And Perimeter, And more!
Host and Defense
  • 22 decks
  • 631 flashcards
  • 4 learners
Decks: Bacteriology 12, Mycology 12, Immunology 11, And more!
Make Flashcards