06 Flashcards

1
Q

____________ is the one demand delivery of IT resources and applications across the internet

A

Cloud Computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

___________ is how you implement cloud in your business

A

Deployment methods

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In a ___________ the cloud infrastructure is provisioned for exclusive use by a single organization comprised of multiple consumers

A

Private Cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In aq ___________ the cloud infrastructure is provisioned for open use by the public and may be owned /operated by a business, academic, or government organization or both.

A

Public Cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A _____________ exists when multiple organizations share a common concern, such as specific security requirements

A

community cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A _____________ consists of the combination of two or more cloud deployment models

____________ where additional processing is handled outside the standard cloud infrastructure

A

Hybrid Cloud

Cloud Bursting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

____________ is how you utilize the cloud

A

service model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

_____________ Is the customers use of applications running from a cloud provider but they have no control over the infrastructure

A

SaaS Software as a service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

____________ is when a client creates their own applications or software but uses programming languages and tools supported by the cloud provider. The client has no control over the infrastructure

A

Paas Platform as a Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

_______________ is the provisioning of processing, storage, and networks to a customer

A

Infrastructure as a service Iaas

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

_____________ is the analysis and practice of concealing information and sensitive data

A

Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

______________ encrypts data, hiding contents from unauthorized users

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

______________ Provides checksums and supports digital signatures

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

_______________ Credential checks ensure availability to authorized users while denying access to unauthorized users

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

_______________ When user accounts are assigned a password, that password is hashed and stored in the system , whe the same account tries to login the password they enter is hashed and compared to the one stored in the database. If it matches their let in.

A

Password Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

______________ by hashing certain installed files, such as an executable, a user is assured that file has not been changed or replaced by another

A

File Verification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

_____________ Is a technique of providing confidentiality by converting ordinary data into ciphertext, which is unintelligible

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

____________ uses a single key to encrypt and decrypt the data. Both the sender and receiver must have a copy of the same key

A

Symmetric Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

____________ Uses a different key for encryption than decryption. Based on a one-way function where the same key used for encryption of the data cannot be used for decryption of the data.

A

Asymmetric encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

To be sure a sender is who they say they are ________________ are used.

A

digital signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Verifying identity and if the user is allowed to a space is achieved through _________________

A

digital certificates

22
Q

_______________ is the protection of the network devices, data, and users, in essence the network as a whole entity

A

network security

23
Q

A _________ is defined as something that has the potential to damage the network, to include data, hosts, or users.

A

Network threat

24
Q

Common network threats are?

A

Hardware failures
Access
Malware
Social engineering
Denial of service

25
______________ is the duplication of components or the functions of a system and can go as far as having an entire secondary site on hand in case it is needed
redundancy
26
____________ protects data through the means of logical controls. These controls include the use of passwords, permissions, access control lists, and traffic filtering devices such as firewalls
Logical Access
27
___________ is the non-local logical access to a network systems or resources from a separate physical location.
Remote Access
28
A _______ is a type of malicious software that distributes itself over the network via user interaction
Virus
29
A ______ is a self-replicating and self-propagating type of malicious software. Unlike viruses, ______ do not need user interaction to execute
Worm
30
_________ Is a seemingly innocent file that contains malicious code underneath
Trojan
31
A ________ is a stealthy type of malware designed to hide existence of specific processes or programs from normal methods of detection and enable continued privilege access to the computer
RootKit
32
All computers infected by a ______ are collectively called a _______, which allows system access to an attacker and causes the attackers computer too be the command-control server
bot, botnet
33
Three main methods of malware prevention?
Anti-malware programs, training, procedures
34
__________ is the process of exploiting human behavior to gain authorized access to information
social engineeering
35
__________ can be broadly characterized by any action that prevents an unauthorized user rom accessing data, a device, or any resource they should normally have access to
DoS, Denial of service
36
___________ overwhelms a system like DoS but through multiple source computers
DDos
37
_________ are hardware and/or software that protect computers and networks from external attacks by utilizing permit/deny statements, filtering any unauthorized or illegitimate traffic
Firewalls
38
__________ software applications or suite of applications installed ona single computer
Host-based firewall
39
________ functioning on a network level, the firewall filters data as it travels from teh internet to computer on the network
Network-based firewalll
40
An _________ is a security tool used to monitor a network and detect unauthorized activities and anomalies, to detect possible intrusions
Intrusion Detection System
41
An _______ that respond to detected issues by blocking traffic or otherwise preventing the malicious activity.
Intrusion Prevention Systems
42
___________ collects and analyzes data that originates on a computer that hosts a service, such as a web server
Host-Based Intrusion Detction/prevention system
43
____________ Analyzes data packets that travel over the actual network to verify their nature as malicious or benign
Network-Based Intrusion Detction/prevention system
44
________ is a framework of data protection for databases that contain usernames and passwords. What do these mean?
AAA Authentication: presenting credentials to network Authorization: The determination of what tasks are and are not allowed on the network Accounting: keeping a log of everything that happens on the network
45
__________ is an AAA standard used in supporting thousands of access points managed by ISPs and linking them to a single database
RADIUS, AAA vendor neutral
46
__________ is another AAA protocol developed by Cisco to include access to routers and switches
TACACS AAA Cisco only
47
________ Is yet another AAA protocol based on TACACS and developed by Huawei
HWTACACAS
48
__________ Is a suite of protocols which allows for secure data transmissions over IP-based networks through authentication and encryption. It is a MANDATORY component of IPV6 because it works at layer 3 of the OSI model
IPsec
49
The ___________ protocol handles authentication services for IPsec. AH provides data integrity and authentication for IP Traffic. It ensures data integrity not security
Authentication Header (AH)
50
The ________________ further protects a datagram by encrypting its payload, ensuring the privacy of a message. Uses a symmetric encryption algorithm to encrypt the payload of the ip packet Ensures data security not integrity
Encapsulating security payload (ESP)
51
The _____________ only encrypts and authenticates the payload of the IP packet, providing the most security by enabling the security functions between two communicating devices or end-points.
Transport mode
52
__________ protects communication between routers and not end hosts. This method provides protection for portions of the route, which travels outside the organization.
Tunnel Mode