CCNP SCOR Book Terms Flashcards
(158 cards)
______________ is a security technology that actively monitors network or system activities to detect and prevent unauthorized access, attacks, or malicious activities. It works by analyzing traffic patterns and taking action to block or mitigate threats in real-time.
Intrusion Prevention (IPS)
______________ are devices or systems that monitor network traffic and system behavior to detect potential security threats or intrusions. These sensors are part of Intrusion Detection and Prevention Systems (IDPS).
Intrusion Sensors
______________ refers to how and where intrusion sensors are positioned within a network. Common deployment modes include inline (in the data path), passive (monitoring only), and TAP (Test Access Point) mode.
Sensors Deployment Mode
______________ are intrusion sensors placed at various points within a network to monitor and analyze network traffic for signs of intrusions or threats.
Network-Based Sensors
______________ are installed on individual host systems (such as servers or endpoints) to monitor the behavior and security of those hosts.
Host-Based Sensors
______________ are methods and techniques used to identify and classify security threats and attacks, such as signature-based detection, anomaly-based detection, and behavior-based detection.
Attack Detection Strategies
______________ refers to the protection of data and information from threats and vulnerabilities, including measures to prevent unauthorized access, data leakage, and content-based attacks.
Content Security
______________ focuses on securing individual devices (endpoints) such as computers, mobile devices, and servers from various threats, including malware, unauthorized access, and data breaches.
Endpoint Security
______________ is any software designed to harm, exploit, or compromise the security of a computer system. Common types of malware include viruses, worms, Trojans, and spyware.
Malware (Malicious Software)
______________ is an IEEE standard for port-based network access control. It provides authentication and authorization mechanisms for controlling access to network resources.
802.1x
______________ refers to the flow of email messages within an email system, including sending, receiving, routing, and processing emails.
Email Pipeline
A ______________ is a visual representation of ideas, concepts, or information arranged in a hierarchical and interconnected manner. It is often used for brainstorming, organizing thoughts, or summarizing complex topics.
Mind-Map
______________ is a security appliance used for email security, including features like spam filtering, malware detection, email encryption, and email content filtering.
Cisco ESA (Email Security Appliance)
______________ refers to techniques and tactics used by attackers to bypass or evade email security measures, such as spam filters or antivirus scanners.
Email Security Evasion
______________ is the process of encoding email messages to protect their contents from unauthorized access. It ensures that only the intended recipient can read the email.
Email Encryption
______________ are security threats that originate from web-based sources, including malicious websites, phishing sites, and web-based malware distribution.
Web-Based Threats
______________ refer to the capabilities and functions of a Web Security Appliance, which is used to enforce web security policies, filter web content, and protect against web-based threats.
WSA Features (Web Security Appliance)
______________ is a protocol used to redirect web traffic for caching and security purposes. It allows network devices to intercept and redirect web traffic to a caching or security appliance.
Web Cache Communications Protocol (WCCP)
______________ is a cloud-based web security solution that provides web content filtering, threat protection, and visibility for web traffic.
Cisco Cloud Web Security
______________ are components that facilitate the integration of Cisco Cloud Web Security with on-premises network infrastructure.
Cisco CWS Connectors
______________ are a type of malware that attaches itself to a legitimate program or file and spreads when the infected program is executed. Viruses can cause various forms of damage to a computer system.
Viruses
______________ are self-replicating malware that spread across networks and systems without the need for user intervention. They can propagate rapidly and cause widespread disruptions.
Worms
In a security context, a “______________” typically refers to a malicious or harmful piece of code or script that triggers a destructive action when activated.
Bomb
A ______________ is a type of malware that disguises itself as a legitimate or benign program but, when executed, performs malicious actions without the user’s knowledge.
Horses (Trojan Horses), or simply “Trojan”