IS3220 CHAPTER 2 Flashcards
This is a port or portal authentication. A mechanism commonly used by network devices, such as firewalls, routers, switches, and wireless access points, to perform authentication of users before allowing communication to continue across or through the device. The authentication can take place locally on the device or go to and authentications service, such as a credit card payment system, PKI, or directory service. This is called ___?
802.1x
Malicious software programs distributed by hackers to take over control of victim’s computers. AKA bot or zombies. These are commonly used to construct botnets and are called ___?
AGENTS
The calculation of the total loss potential across a year for a given asset and a specific threat. This is called ___?
ANNUALIZED LOSS EXPECTANCY (ALE)
A probability prediction based on statistics and historical occurrences on the likelihood of how many times in the next year is a threat going to cause harm. This is called ___?
ANNUALIZED RATE OF OCCURRENCE (ARO)
A hardened hardware firewall is called an ___?
APPLIANCE FIREWALL
The top or seventh layer of the OSI model. This layer is responsible for enabling communications with host software, including the operating system. This layer is the interface between host software and the network protocol stack. the sub-protocols of this layer support specific applications or types of data and is called ___?
APPLICATION LAYER (LAYER 7)
A type of firewall that filters on a specific application’s content and session information is called ___?
APPLICATION PROXY/FIREWALL/GATEWAY
The cumulative value of an asset based on both tangible and intangible values. This supports the SLE calculation and is called ___?
ASSET VALUE (AV)
A firewall positioned at the initial entry point where a network interfaces with the Internet. It serves as the first line of defense for the network. AKA a sacrificial host and is called ___?
BASTION HOST
A description often applied to firewalls positioned on network zone transitions or gateway locations and is called ___?
BORDER SENTRY
A network of zombie/bot/agent-comprised systems controlled by a hacker is called ___?
BOTNETS
Malicious software programs distributed by hackers to take over control of victims’ computers. AKA agents or zombies. These are commonly used to construct botnets and are called ___?
BOTS
A logical connection between a client and a resource server. May exist at Layer 3, 4, or 5 of the OSI model. AKA session or a state and is called ___?
CIRCUIT
A filtering device that allows or denies the initial creation of a circuit, session, or state, but performs no subsequent filtering on the circuit once established and is called ___?
CIRCUIT PROXY/FIREWALL
A type of software product that is pre-compiled and whose source code is undisclosed is called ___?
CLOSED SOURCE
A firewall product designed for larger networks. Usually a commercial firewall is a hardware device and is called ___?
COMMERCIAL FIREWALL
A form of filtering that focuses on traffic content. Application proxies perform most of these and are called ___?
CONTENT FILTERING
The final equation of risk analysis to assess the relative benefit of a countermeasure against the potential annual loss of a given asset exposed to a specific threat is called ___?
COST/BENEFIT
The second layer of the OSI model responsible for physical addressing (MAC addresses) and supporting the network topology, such as Ethernet is called ___?
DATA LINK LAYER (LAYER 2)
A form of auto-initian switch that triggers when the ongoing prevention mechanism fails. These often include firewalls and hand grenades. If the firewall stops functioning, the connection is severed. This is called ___?
DEAD-MAN SWITCH
The action of processing the contents of a header, removing that header, and sending the remaining payload up to the appropriate protocol in the next higher layer in the OSI model is called ___?
DE-ENCAPSULATION
A firewall that has two network interfaces. Each network interface is located in a uniques network segment. This allows for true isolation of the segments and forces the firewall to filter all traffic moving from one segment to another and is called ___?
DUAL-HOMED FIREWALL
The process of automatically created temporary filters. In most cases, the filters allow inbound responses to previous outbound requests. AKA stateful inspection. This is called ___?
DYNAMIC PACKET FILTERING
The potential amount of harm from a specific threat stated as a percentage. Used in the calculation of SLE and is called ___?
EXPOSURE FACTOR (EF)