{ "@context": "https://schema.org", "@type": "Organization", "name": "Brainscape", "url": "https://www.brainscape.com/", "logo": "https://www.brainscape.com/pks/images/cms/public-views/shared/Brainscape-logo-c4e172b280b4616f7fda.svg", "sameAs": [ "https://www.facebook.com/Brainscape", "https://x.com/brainscape", "https://www.linkedin.com/company/brainscape", "https://www.instagram.com/brainscape/", "https://www.tiktok.com/@brainscapeu", "https://www.pinterest.com/brainscape/", "https://www.youtube.com/@BrainscapeNY" ], "contactPoint": { "@type": "ContactPoint", "telephone": "(929) 334-4005", "contactType": "customer service", "availableLanguage": ["English"] }, "founder": { "@type": "Person", "name": "Andrew Cohen" }, "description": "Brainscape’s spaced repetition system is proven to DOUBLE learning results! Find, make, and study flashcards online or in our mobile app. Serious learners only.", "address": { "@type": "PostalAddress", "streetAddress": "159 W 25th St, Ste 517", "addressLocality": "New York", "addressRegion": "NY", "postalCode": "10001", "addressCountry": "USA" } }

Midterm quiz 1 Flashcards

(10 cards)

1
Q

Are commonly use securely extend an organization’s internal network connections to remote locations.

A

VPN’s (Virtual Private Networks)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Are designed to operate at the media access control sublayer of data link layer of the OSI network model.

A

MAC Layer Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

This allows the user to establish a secure link directly with the remote host.

A

Remote Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The rules are created and sequenced either by a person directly editing the rule set or by a person using a programmable interface.

A

Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Allowed individuals and other organizations to connect using dial-up or leased line connections.

A

Circuit Gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Firewall operates at the ____ layer. A firewall does not usually look for traffic flowing between one network and other.

A

Transport Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A private word or combination of characters that only the user should know.

A

Password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Is the method by which systems determine whether?

A
  • Authorization:
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Contains a computer chip that can verify and validate several pieces of information instead of just PIN.

A

Smart Card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Is the matching of an authenticated entity to a list of information assets and corresponding access levels?

A

Static Filtering/Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly