Domain 4 Flashcards

(42 cards)

1
Q

Control traffic flow on networks and connect similar networks

A

Router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Filter traffic based on a defined set of rules. Also called ACLs

A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Computer that provides info to other computers on a network

A

Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

End of network communication link. A client makes a request to use a network resource.

A

Endpoint

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Represent network interface within the network and maintain communications when physical device when swapped with new hardware.

A

IP Address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the Upper Layer of the OSI Model?

A

Layers 5-7 (SPA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the Lower Layer of the OSI Model?

A

Layers 1-4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Framework for how protocols should function. Common reference to understand components of software interfaces to physical hardware

A

OSI Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Adds information to a packet as it travels to its destination

A

Encapsulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Referencing image file like JPEG or PNG

A

Presentation Layer 6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Logical ports like NetBIOS

A

Session Layer 5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Discussing TCP/UDP

A

Transport Layer 4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Discussing Routers that are sending packets

A

Network Layer 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Discussing switches, bridges or WAPs sending frames

A

Data Link Layer 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Data moves up the OSI model layers from physical to application

A

De-Encapsulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How data moves through the network

A

Network Interface Layer (TCP/IP Layers)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Creates/Inserts packets

A

Internet Layer (TCP/IP Layers)

18
Q

Permits data to move among devices

A

Transport Layer (TCP/IP Layers)

19
Q

Defines the protocols for the transport layer

A

Application Layer (TCP/IP Layers)

20
Q

Determine health of a network or specific link. By ping, traceroute and other network management tools.

A

Internet Control Message Protocol (ICMP)

21
Q

10.0.0.0 to 10.255.255.254
172.16.0.0 to 172.31.255.254
192.168.0.0 to 192.168.255.254

A

Private Addresses

22
Q

Ensure integrity and confidentiality of IP packets and allow communicating partners to authenticate each other

23
Q

Help services obtain an appropriate share of a network’s bandwidth.

24
Q

Security event or multiple events where an intruder gains, attempts or access a system without authorization

25
Event that actually/potentially jeopardize the CIA of an information system, which is processed, stored or transmitted
Incident
26
Action that takes advantage of a flaw in a computer system or software. System vulnerabilities
Exploit
27
Loss of control, compromise, unauthorized disclosure where a person non authorized accesses PII, other than an authorized purpose.
Breach
28
Process of preparing, detecting, analyzing, containing, eradicating and recovering from a security incident
Incident Response
29
Train staff, implement incident response team, identify roles & responsibilities and identify critical data, systems and any single points of failure
Incident Response Preparation
30
Monitor all possible attack vectors, prioritize incident response and incident documentation
Incident Response Detection & Analysis
31
Gather evidence, appropriate containment strategy, identify and isolate the attack
Incident Response Containment, Eradication and Recovery
32
Senior management, info security professionals, public affairs and engineering representatives
Incident Response Team Members
33
Act of developing plans and procedures for maintaining business operations in event of a disaster or security incident
Business Continuity
34
Process to evaluate potential effects of threats that interrupt critical business functions for the purpose of determining recovery plans
Business Impact Analysis
35
A set of standardized rules that allow computers to communicate on a network such as the internet.
TCP/IP
36
Network Communications using the NetBIOS protocol
Ports 137, 138, and 139 (NetBIOS)
37
A malicious attempt to disrupt the normal traffic of a targeted server, service or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic
DDoS
38
Spreads after a user takes some type of user action
Virus
39
Measure encryption footprints. Attackers use footprints monitor system activity and to retrieve information that is actively being encrypted.
Side Channel Attacks
40
Monitors the computer infrastructure on which it is installed, analyzing traffic and logging malicious behavior.
Host-Based IDS (HIDS)
41
Detects malicious traffic on a network.
Network-Based IDS (NIDS)
42