Network And Application Security Week 6/7 Flashcards

1
Q

Active directory

A

A windows component that stores network, domain, and user data. Allows administrators manage permissions and limit network access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Active directory domain services

A

Authenticates users and defines which network resources they can access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Anonymity

A

A condition in which users conceal their online id without masking their activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Asymmetric cryptography (public key cryptography

A

A cryptographic algorithm that requires two separate keys. One private and the other public. Message is encrypted with the public key and decrypted with the private key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Authorization

A

The process that determines whether an id person is allowed access to a resource.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Behavior based detection

A

A type of threat detection that monitors unusual behavior. Ex a large number of requests for a computer or device resource.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Blacklisting

A

The practice of allowing anything to enter a network unless expressly prohibited.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Cloud DLP

A

A type of data loss prevention that encrypts cloud acct.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Correlation rule

A

A rule that instructs a sec mechanism as to which sequence of events may indicate anomalies, security vulnerabilities, or a cyber-attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Data Loss Prevention (DLP)

A

A security tool that helps ensure users don’t transfer Valuable or sensitive data outside of the organization by monitoring, identifying, and blocking unwanted transfers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Demilitarized Zone(DMZ)

A

A subnetwork located between private networks and the public internet which contains services that are fully exposed to the internet. This adds an extra layer of security preventing unnecessary access to private networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Domain controllers DC

A

A server that handles and responds to authentication requests inside a windows server domain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Discretionary Access Control

A

Type is access control that restricts access to resources based on subject’s identity or group membership.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Endpoint agent

A

An EDR agent that monitors and collects data on all endpoint activities and stores it in a centralized database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Endpoint Detection and Response (EDR)

A

A security tool that combines monitoring, protection and response to security threats on endpoints in real time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Endpoint DLP

A

A type of DLP that doesn’t require a network. It monitors servers, workstations, laptops, and mobile devices that use, transfer, or store critical data. It can also monitor unsecure data storage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Hashing

A

A process performed on data such as a file or application to generate a hash value.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Honeypot

A

A security mechanism that sets up a virtual trap to attract attackers. They are a form of misdirection that enables analysts to study the attackers activity patterns.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Host based firewall

A

A firewall that runs on a single networked computer or device. This type of firewall protect individual hosts from malware and attacks and control their network spread.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Host based intrusion detection system (HIDS)

A

A mechanism that runs on each host or endpoint device in a network and checks incoming and outgoing host packets and alerts endpoint users when it detects abnormalities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Hypertext transfer protocol (HTTP)

A

A protocol that defines how messages are formatted and transmitted, as well as the actions web servers and browsers should take in response to various commands.

22
Q

Incident Response

A

A collection of information security rules and procedures implemented by an organization to detect, contain, and remove cyber attacks.

23
Q

Incident Detection

A

A task carried out by analysts to detect and collect data from IT systems, security technologies, and publicly available data as well as detect attack precursors and indicators.

24
Q

Internet protocol security (IPsec)

A

A protocol that secures Internet communication across an IP network by verifying the session and encrypting each data packet during the connection.

25
Q

Kerberos

A

A system that acts as a boundary between users and the network. It uses strong cryptography to allow clients to prove their ID to a server over an insecure network connection.

26
Q

Key Distribution Center (KDC)

A

An access control component responsible for issuing access tickets and session keys in response to user requests for resource access.

27
Q

Lightweight Directory Access Protocol (LDAP)

A

A protocol that allows programs to access user information quickly. It’s a simple client-server protocol used to access directory services.

28
Q

Local Area Network

A

A collection of interconnected computers in a small area such as a building or an office.

29
Q

Mandatory Access Control (MAC)

A

A type of access control in which the ability to grant or deny access to resource objects in a file system is restricted by an OS.

30
Q

MD5

A

A type of hashing algorithm that encodes a string of information into a 128 bit fingerprint.

31
Q

Network DLP

A

A type of DLP that secures network data by monitoring and analyzing network traffic.

32
Q

Network based Firewall

A

A type of firewall that protects computer networks from attacks and restricts network traffic so that only authorized packets can access the organizations network, servers and assets.

33
Q

New technology LAN Manager (NTLM)

A

A challenge response authentication mechanism that allows clients to prove their ID without submitting a password to the server.

34
Q

Network based intrusion Detection system (NIDS)

A

A mechanism that monitors network traffic to detect threats. It examines al network packets content and headers.

35
Q

OpenVPN

A

A type of VPN that creates secure point to point or site to site connections and remote access. It runs client and server apps.

36
Q

Privacy

A

A condition in which no one can see a users actions but they may be able to determine who the user is.

37
Q

Psuedonymity

A

The id of a person by a name that isn’t their actual name.

38
Q

Remote access VPN

A

a type of VPN that allows remote users to securely access and use apps and data located in a remote network by encrypting all outgoing and incoming traffic.

39
Q

Role based access control (RBAC)

A

A method for restricting access to a resource based on a users position within the organization.

40
Q

Secure shell protocol (SSH)

A

A protocol that provides users a secure way to access a computer over an unsecured network.

41
Q

Secure sockets layer protocol (SLL)

A

A protocol responsible for protecting data sent between web browsers and servers. It encrypts the connection between the two parties to protect their data.

42
Q

SHA

A

Hashing algorithms that encrypt data and are considered very secure. The subtypes include SHA1 and SHA256. The greater the number following SHA the more recent and sophisticated the version.

43
Q

Single sign on(SSO)

A

Authentication that allows a user to authenticate and securely with multiple applications and websites using a single set of credentials.

44
Q

Site to site VPN

A

A type of VPN that relies on router to router communication, one router serves as the VPN client and the other is the VPN Server.

45
Q

Stateful firewall

A

A type of firewall capable of monitoring all aspects of network traffic, including communication channels and characteristics.

46
Q

Symmetric key cryptography

A

An encryption system where the sender and receiver of a message share a single key to both encrypt and decrypt the message.

47
Q

The 3 a’s

A

Stands for Access Control, authentication, and Authorization. An indispensable framework for network management and security.

48
Q

Ticket granting ticket

A

A user authentication token generated by the KDC that is used to request access to particular resources/systems without repeatedly entering credentials.

49
Q

Transport Layer Security Protocols (TLS)

A

An enhanced and more secure version of ssl. TLS offers end to end security for different data transmissions between applications and services.

50
Q

Web application Firewall

A

Protects web applications by filtering and monitoring HTTP traffic between a web application and the Internet.

51
Q

Whitelisting

A

The practice of defining permitted access as opposed to blocking prohibited access.