Set 1 Flashcards
(88 cards)
Backs up all files that have changed since the last full backup
Differential Backup
What is the OSI Layer does connection between applications on each computer?
Layer 5 (Session)
Default Subnet Mask for Class A Range
/8
255.0.0.0
Refers to the process of settings all data bits to zero, effectively erasing the data
Zeroization
How do worms spread from system to system?
Software Vulnerabilities/Exploits
What is the 3-way handshake?
SYN, SYN-ACK, ACK
Between client & server
Adverse
Preventing success or development; harmful
Set of guidelines or rules that dictate how access control should be implemented
Policy
Most common form of risk when buying insurance
Transference
What OSI Layer do TCP & UDP Operate at?
Layer 4 (Transport)
Provides automated log monitoring & analysis
Security Information and Event Management (SIEM) System
Allows owner of resource to configure access rules. Full control to configure what subjects can access the object
Discretionary Access Control (DAC)
An entity/resource that’s accessed by subject
Object
Regulate access based on security labels assigned by central authority. More commonly used in the military and government
Mandatory Access Control (MAC)
What is another name for host-based IDS/IPS products?
Endpoint Security Products
Default Subnet Mask for Class C Range
/24
255.255.255.0
Users, resources & environment conditions to make access decisions
Attribute-Based Access Control (ABAC)
Backs up all files that have changed since the last backup of any type
Incremental Backup
Management-oriented controls that provide directives and instruction aimed at people within the organization
Administrative
A list of all subjects and their respective permissions for a specific object
Access Control List (ACL)
What OSI Layer deal with transmitting & receiving bits?
Layer 1 (Physical)
What OSI Layer transmits & delivers frame throughout a LAN based on physical MAC addresses?
Layer 2 (Data Link)
Assigns access based on roles within an organization
Role-Based Access Control (RBAC)
Defines the conditions under which access is allowed/denied
Rule