Devices and Infrastructure Flashcards

1
Q

Access control list (ACL)

A

Data file that specified whether a user has access to a specific resource on a computer or network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ACL

A

access control list

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Access point (AP)

A

The point at which access to a network is accomplished

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

AP

A

access point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Active response

A

A response generated in real time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Alarm

A

A notification that an unusual condition exists and should be investigated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Alert

A

An indication that an unusual condition COULD exist and should be investigated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

all-in-one

A

An appliance that performs multiple functions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Analyzer

A

The component or process that analyzes the data collected by the sensor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Anomalies

A

Variations from normal operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Anomaly-detection intrusion detection system (AD-IDS)

A

Works by looking for deviations from a pattern of normal network traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

AD-IDS

A

anomaly-detection intrusion detection system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Application-level proxy

A

A device or software that recognizes application-specific commands and offers gradual control over them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Authentication header (AH)

A

An IPSec header used to provide connectionless integrity and data origin authentication; provides protection against replays

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

AH

A

authentication header

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Compensating controls

A

Gap controls that fill in the coverage between the other types of vulnerability mitigation techniques

“Where there are holes in coverage, we compensate for them”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Data loss prevention (DLP)

A

Any systems that monitor and protect data to prevent it from unauthorized use, modification, or destruction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

DLP

A

data loss prevention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Encapsulating Security Payload (ESP)

A

IPSec header used to provide a mix of security services in IPv4 and IPv6; can be used with IP authentication header (AH)

20
Q

ESP

A

encapsulating security payload

21
Q

Encapsulation

A

The process of enclosing data in a packet

22
Q

Host-based IDS (HIDS)

A

An intrusion detection system that is just based (as opposed to network based)

23
Q

HIDS

A

host-based intrusion detection system

24
Q

Hardware security module (HSM)

A

A software or appliance stand-alone used to enhance security; commonly used with PKI systems

25
Implicit deny
A condition that states that u less otherwise given, the permission will be denied
26
Internet Protocol Security (IPSec)
A set of protocols that enable encryption, authentication, and integrity over IP; commonly used with VPN
27
HSM
hardware security module
28
IPSec
Internet Protocol Security
29
Key management
Management of all aspects of cryptographic keys in a cryptosystem (key generation, storage, etc)
30
Load balancing
Dividing a load for greater efficiency of management among multiple devices
31
Network access control (NAC)
The set of standards defined by the network for clients attempting to access it
32
NAC
network access control
33
Network intrusion prevention systems (NIPS)
An intrusion prevention system that is network based
34
NIPS
network intrusion prevention system
35
Network-based IDS (NIDS)
An approach to an intrusion detection system; placed at a point in the network where it can monitor and report on all network traffic
36
Passive response
A nonactive response Ex: logging, monitoring, etc
37
NIDS
network-based intrusion detection system
38
Proxy
A type of system that prevents direct communication between a client and a host by acting as an intermediary
39
Proxy firewall
A proxy server that also acts as a firewall, blocking network access from external networks
40
Secure Sockets Layer (SSL)
A protocol that secures messages by operating between the Application later (HTTP) and the transport layer
41
SSL
Secure Sockets Layer
42
SIEM
Security Information and Event Management
43
Security Information and Event Management (SIEM)
Combines security information management (SIM) and security event management (SEM) functions to provide real-time analysis of security alerts
44
Signature-based system
A system that acts based on the digital signature it sees and offers no repudiation to increase the integrity of a message
45
SSID broadcast
An access point’s broadcasting of the network name
46
Switch
A network device network that can replace a router in a local network