Terminology Flashcards

1
Q

Access Control

A

The process of granting or denying specific requests for or attempts to connect to a corporate network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The process of granting or denying specific requests for or attempts to connect to a corporate network.

A

Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Access Control List (ACL)

A

Applies rules to switch ports or (Internet Protocol) IP addresses available to a host or switch. The rules determine whether packets can flow through those ports or IPs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Set of rules that apply to switch ports or (Internet Protocol) IP addresses available to a host or switch. The rules determine whether packets can flow through those ports or IPs.

A

Access Control List (ACL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Access Layer

A

The concentration point at which clients access the network. Access layer devices control traffic by localizing service requests to the access medial.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The concentration point at which clients access the network. These devices control traffic by localizing service requests to the access medial.

A

Access Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Accounting

A

The final piece in the AAA framework is accounting, which monitors the resources a user consumes during network access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The final piece in the AAA framework, which monitors the resources a user consumes during network access.

A

Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Agent

A

A piece of software that functions as an agent for a user or another program, working autonomously and continuously in a particular environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A piece of software that functions as an agent for a user or another program, working autonomously and continuously in a particular environment.

A

Agent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Antivirus

A

A program that monitors a computer or network to detect or identify major types of malicious code and to prevent or contain malware incidents. Sometimes by removing or neutralizing the malicious code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A program that monitors a computer or network to detect or identify major types of malicious code and to prevent or contain malware incidents. Sometimes by removing or neutralizing the malicious code.

A

Antivirus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Attack Surface

A

The set of ways in which an adversary can enter a system and potentially cause damage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The set of ways in which an adversary can enter a system and potentially cause damage.

A

Attack Surface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Authentication

A

The process of verifying the identity or other attributes of an entity (user, process, or device).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The process of verifying the identity or other attributes of an entity (user, process, or device).

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Authoization

A

A process of determining, by evaluating applicable access control information, whether a subject is allowed to have the specified types of access to a particular resource.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A process of determining, by evaluating applicable access control information, whether a subject is allowed to have the specified types of access to a particular resource.

A

Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Compliance

A

A program that establishes risk-based controls to protect the integrity, confidentiality, and accessibility of information stored, processed, or transferred.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A program that establishes risk-based controls to protect the integrity, confidentiality, and accessibility of information stored, processed, or transferred.

A

Compliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Data Breach

A

The unauthorized moment or disclosure of sensitive information to a party, usually outside the organization, that is not authorized to have or see the information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

The unauthorized moment or disclosure of sensitive information to a party, usually outside the organization, that is not authorized to have or see the information.

A

Data Breach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Data Loss Prevention

A

Procedures and mechanism to stop sensitive data from leaving a security boundary.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Procedures and mechanism to stop sensitive data from leaving a security boundary.

A

Data Loss Prevention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Digital Certificate

A

A file or electronic password that proves the authenticity of a device, server, or user with cryptography and the public key infrastructure (PKI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

A file or electronic password that proves the authenticity of a device, server, or user with cryptography and the public key infrastructure (PKI)

A

Digital Certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Distributed Denial of Service (DDos)

A

A denial of service technique that uses numerous systems to perform the attack simultaneously.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

A denial of service technique that uses numerous systems to perform the attack simultaneously.

A

Distributed Denial of Service (DDos)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Extensible Authentication Protocol (EAP)

A

An architectural framework that provides extensibility for the authentication methods for commonly used protected network access technologies, such as IEEE 802.1X-based wireless access, IEEE 802.1X-based wired access, and point-to-point protocol (PPP) connections such as Virtual Private Networking (VPN).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

An architectural framework that provides extensibility for the authentication methods for commonly used protected network access technologies, such as IEEE 802.1X-based wireless access, IEEE 802.1X-based wired access, and point-to-point protocol (PPP) connections such as Virtual Private Networking (VPN).

A

Extensible Authentication Protocol (EAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Firewall

A

A hardware/software device or a software program that limits network traffic according to a set of rules of what access is and is not allowed or authorized.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

A hardware/software device or a software program that limits network traffic according to a set of rules of what access is and is not allowed or authorized.

A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

HTTPS

A

Secure Hypertext Transfer Protocol is the secure version of HTTP. Data sent between the browser and server are encrypted to ensure protection. Which Network Protocol Types are Right for You?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

The secure version of HTTP. Data sent between the browser and server are encrypted to ensure protection. Which Network Protocol Types are Right for You?

A

HTTPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Information Security Policy

A

An aggregate of directives, regulations, roles and practices that prescribe how an organization manages, protects, and distributes information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

An aggregate of directives, regulations, roles and practices that prescribe how an organization manages, protects, and distributes information.

A

Information Security Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Intrusion Detection

A

The process and methods for analyzing information from networks and information systems to determine if a security break or security violation has occurred.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Internet of Things

A

A network of connected smart devices providing rich operational data to enterprises. It is a catch-all term for the growing number of electronics that aren’t traditional computing devices, but are connected to the internet to gather data, receive instructions, or both.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

A network of connected smart devices providing rich operational data to enterprises. It is a catch-all term for the growing number of electronics that aren’t traditional computing devices, but are connected to the internet to gather data, receive instructions, or both.

A

Internet of Things

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Internet Protocol Security (IPSec)

A

A secure network protocol suite that authenticates and encrypts data packets to provide secure encrypted communication between two computers over an Internet Protocol network. It is used in virtual private networks (VPNs).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

A secure network protocol suite that authenticates and encrypts data packets to provide secure encrypted communication between two computers over an Internet Protocol network. It is used in virtual private networks (VPNs).

A

Internet Protocol Security (IPSec)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Lightweight Directory Access Protocol (LDAP)

A

An open, Vendor-neutral, industry-standard application protocol for accessing and maintaining distributed directory information services over an IP network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

An open, Vendor-neutral, industry-standard application protocol for accessing and maintaining distributed directory information services over an IP network.

A

Lightweight Directory Access Protocol (LDAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Link Layer

A

The lowest layer in the internet protocol suite, the networking architecture of the Internet. The link layer is the group of methods and communications protocols confined to the link that a host if physically connected to.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

The lowest layer in the internet protocol suite, the networking architecture of the Internet. The link layer is the group of methods and communications protocols confined to the link that a host if physically connected to.

A

Link Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Local Area Network (LAN)

A

A network that covers a small area such as a small office or home. It physically connects all the computers located in the premises.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

A network that covers a small area such as a small office or home. It physically connects all the computers located in the premises.

A

Local Area Network (LAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Media Access Control (MAC) Address

A

The unique 48-bit serial number in the network circuitry of every Ethernet and Wi-Fi device. The MAC address, which holds 256 trillion unique numbers, identifies that device from every other globally.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

The unique 48-bit serial number in the network circuitry of every Ethernet and Wi-Fi device. The MAC address, which holds 256 trillion unique numbers, identifies that device from every other globally.

A

Media Access Control (MAC) Address

50
Q

MAC Address Bypass (MAB)

A

An alternative authentication method for devices that do not support 802.1x.

51
Q

An alternative authentication method for devices that do not support 802.1x.

A

MAC Address Bypass (MAB)

52
Q

Malware

A

Software that compromises the operation of a system by performing an unauthorized function or process.

53
Q

Software that compromises the operation of a system by performing an unauthorized function or process.

A

Malware

54
Q

Man in the Middle (MitM) Attack

A

A form of active wiretapping attack in which the attacker intercepts and selectively modifies communicated data to masquerade as one or more of the entities involved in a communication association.

55
Q

A form of active wiretapping attack in which the attacker intercepts and selectively modifies communicated data to masquerade as one or more of the entities involved in a communication association.

A

Man in the Middle (MitM) Attack

56
Q

Micro-Segmentation

A

Creating secure zones in networks, in data centers, and cloud deployments by segregating sections so only designated users and applications can gain access to each segment.

57
Q

Creating secure zones in networks, in data centers, and cloud deployments by segregating sections so only designated users and applications can gain access to each segment.

A

Micro-Segmentation

58
Q

Mitigation

A

Implementing appropriate risk-reduction controls based on risk management priorities and analysis of alternatives.

59
Q

Implementing appropriate risk-reduction controls based on risk management priorities and analysis of alternatives.

A

Mitigation

60
Q

Multi-Factor Authentication (MFA)

A

An authentication method that requires the user to provide two or more verification factors to fain access to a resource such as an application, online account, or a VPN.

61
Q

A
An authentication method that requires the user to provide two or more verification factors to fain access to a resource such as an application, online account, or a VPN.

A

Multi-Factor Authentication (MFA)

62
Q

Multi-Protocol Label Switching (MPLS)

A

A packet protocol that ensures reliable connections for real-time applications, but its expensive, leading many enterprises to consider SD-WAN to limit its use.

63
Q

A packet protocol that ensures reliable connections for real-time applications, but its expensive, leading many enterprises to consider SD-WAN to limit its use.

A

Multi-Protocol Label Switching (MPLS)

64
Q

Network Access Control (NAC)

A

An approach to computer security that attempts to unify endpoint-security technology, user, or systems authentication, and network security enforcement.

65
Q

An approach to computer security that attempts to unify endpoint-security technology, user, or systems authentication, and network security enforcement.

A

Network Access Control (NAC)

66
Q

Network Operating System (NOS)

A

The operating system that runs on network switches. Cumulus Linux is an NOS.

67
Q

The operating system that runs on network switches. Cumulus Linux is an NOS.

A

Network Operating System (NOS)

68
Q

Network Operations Center (NOC)

A

Also known as a “network management center,” is one or more locations from which network monitoring and control, or network management, is exercised over a computer network.

69
Q

Also known as a “network management center,” is one or more locations from which network monitoring and control, or network management, is exercised over a computer network.

A

Network Operations Center (NOC)

70
Q

Network Resilience

A

The ability of a network to:

1) provide continuous operation (i.e., highly resistant to disruption and able to operate in a degraded mode if damaged)

2) recover effectively if failure does occur

3) scale to meet rapid or unpredictable demands

71
Q

The ability of a network to:

1) provide continuous operation (i.e., highly resistant to disruption and able to operate in a degraded mode if damaged)

2) recover effectively if failure does occur

3) scale to meet rapid or unpredictable demands

A

Network Resilience

72
Q

Network Switch

A

A device that operates a the Data Link Layer of the OSI model - Layer 2. It takes in packets being sent by devices that are connected to its physical ports and sends then out again, but only through the ports that lead to the devices the packets are intended to reach. They also operate at the network layer - Layer 3 where routing occurs.

73
Q

A device that operates a the Data Link Layer of the OSI model - Layer 2. It takes in packets being sent by devices that are connected to its physical ports and sends then out again, but only through the ports that lead to the devices the packets are intended to reach. They also operate at the network layer - Layer 3 where routing occurs.

A

Network Switch

74
Q

Network Virtualization

A

The combination of network hardware and software resources with network functionality into a single, software-based administrative entity known as a virtual network. Network virtualization involves platform virtualization, often combined with resource virtualization.

75
Q

The combination of network hardware and software resources with network functionality into a single, software-based administrative entity known as a virtual network. Network virtualization involves platform virtualization, often combined with resource virtualization.

A

Network Virtualization

76
Q

Passive Attack

A

An actual assault perpetrated by an intentional thread source that attempts to learn or make use of information from a system, but does not attempt to alter the system, its resources, data, or operations.

77
Q

An actual assault perpetrated by an intentional thread source that attempts to learn or make use of information from a system, but does not attempt to alter the system, its resources, data, or operations.

A

Passive Attack

78
Q

Phishing

A

The fraudulent practice of sending emails purporting to be from reputable companies to induce individuals to reveal personal information, such as passwords, and credit card numbers.

79
Q

The fraudulent practice of sending emails purporting to be from reputable companies to induce individuals to reveal personal information, such as passwords, and credit card numbers.

A

Phishing

80
Q

Public Key Infrastructure (PKI)

A

A framework consisting of standards and services to enable secure, encrypted communication and authentication over potentially insecure networks such as the internet.

81
Q

A framework consisting of standards and services to enable secure, encrypted communication and authentication over potentially insecure networks such as the internet.

A

Public Key Infrastructure (PKI)

82
Q

Remote Authentication Dial-In User Service (RADIUS)

A

A protocol that provides centralized authentication, authorization, and accounting management (AAA) for users connected to a network device or service.

83
Q

A protocol that provides centralized authentication, authorization, and accounting management (AAA) for users connected to a network device or service.

A

Remote Authentication Dial-In User Service (RADIUS)

84
Q

Redundancy

A

Additional or alternative systems, sub-systems, assets, or processes that maintain a degree of overall functionality in case of loss or failure of another system, sub-system, asset, or process.

85
Q

Additional or alternative systems, sub-systems, assets, or processes that maintain a degree of overall functionality in case of loss or failure of another system, sub-system, asset, or process.

A

Redundancy

86
Q

Risk Assessment

A

The appraisal of the risks facing a network, and includes determining the extent to which adverse circumstances or events could result in harmful consequences.

87
Q

Additional or alternative systems, sub-systems, assets, or processes that maintain a degree of overall functionality in case of loss or failure of another system, sub-system, asset, or process.

A

Redundancy

88
Q

Router

A

A networking device that forwards data packets between computer networks. Routers operate at Layer 3 of the OSI model and perform traffic-directing functions between subnets within organizations and on the internet.

89
Q

A networking device that forwards data packets between computer networks. Routers operate at Layer 3 of the OSI model and perform traffic-directing functions between subnets within organizations and on the internet.

A

Router

90
Q

Single Sign-On (SSO)

A

An authentication method that enables users to securely authenticate with multiples applications and websites by using just one set of credentials.

91
Q

An authentication method that enables users to securely authenticate with multiples applications and websites by using just one set of credentials.

A

Single Sign-On (SSO)

92
Q

Software-Defined Wide-Area Networks (SD-WAN)

A

Software that can manage and enforce the routing of WAN traffic to the appropriate wide-area connection based on policies that can take into consideration factors including cost, link, performance, time of day, and application needs based on policies. Like its bigger technology brother, software-defined networking, SD-WAN decouples the control plane from the data plane.

93
Q

Software that can manage and enforce the routing of WAN traffic to the appropriate wide-area connection based on policies that can take into consideration factors including cost, link, performance, time of day, and application needs based on policies. Like its bigger technology brother, software-defined networking, SD-WAN decouples the control plane from the data plane.

A

Software-Defined Wide-Area Networks (SD-WAN)

94
Q

Secure Access Service Edge (SASE)

A

A network architecture that rolls software-defined wide area networking (SD-WAN) and security into a cloud service that promises simplified WAN deployment, improved efficiency and security, and to provide appropriate bandwidth per application.

95
Q

A network architecture that rolls software-defined wide area networking (SD-WAN) and security into a cloud service that promises simplified WAN deployment, improved efficiency and security, and to provide appropriate bandwidth per application.

A

Secure Access Service Edge (SASE)

96
Q

Software-Defined Networking (SDN)

A

A cloud computing strategy that facilitates network management and enables programmatically efficient network configuration to improve network performance and monitoring.

97
Q

A cloud computing strategy that facilitates network management and enables programmatically efficient network configuration to improve network performance and monitoring.

A

Software-Defined Networking (SDN)

98
Q

Spoofing

A

Faking the sending address of a transmission to gain illegal (unauthorized) entry into a secure system.

98
Q

Faking the sending address of a transmission to gain illegal (unauthorized) entry into a secure system.

A

Spoofing

99
Q

Secure Socket Layer (SSL)

A

A network security protocol primarily used for ensuring secure internet connections and protecting sensitive data. The protocol can allow for server/client communication as well as server/server connection. Data transferred with SSL is encrypted to prevent it from being readable.

100
Q

A network security protocol primarily used for ensuring secure internet connections and protecting sensitive data. The protocol can allow for server/client communication as well as server/server connection. Data transferred with SSL is encrypted to prevent it from being readable.

A

Secure Socket Layer (SSL)

101
Q

System Administration

A

Cybersecurity work where a person: Installs, configures, troubleshoots, and maintains server configurations (hardware and software) to ensure their confidentiality, integrity, and availability; also manages accounts, firewalls, and patches; responsible for access control, passwords, and account creation and administration.

102
Q

Cybersecurity work where a person: Installs, configures, troubleshoots, and maintains server configurations (hardware and software) to ensure their confidentiality, integrity, and availability; also manages accounts, firewalls, and patches; responsible for access control, passwords, and account creation and administration.

A

System Administration

103
Q

Terminal Access Controller Access Control System (TACACS)

A

An authentication protocol used for remote authentication and related services for networked access control through a centralized server.

104
Q

An authentication protocol used for remote authentication and related services for networked access control through a centralized server.

A

Terminal Access Controller Access Control System (TACACS)

105
Q

Threat Agent

A

An individual, group, organization or government that conducts or has the intent to conduct detrimental activities.

106
Q

An individual, group, organization or government that conducts or has the intent to conduct detrimental activities.

A

Threat Agent

107
Q

Threat Assessment

A

The product or process of identifying or evaluating entities, actions, or occurrences, whether natural or man-made, that have or indicate the potential to harm life, information, operations, and/or property.

108
Q

The product or process of identifying or evaluating entities, actions, or occurrences, whether natural or man-made, that have or indicate the potential to harm life, information, operations, and/or property.

A

Threat Assessment

109
Q

Trojan Horse

A

A computer program that appears to have a useful function, but also has a hidden and potentially malicious function that evades security mechanisms, sometimes by exploiting legitimate authorizations of a system entity that invokes the program.

110
Q

A computer program that appears to have a useful function, but also has a hidden and potentially malicious function that evades security mechanisms, sometimes by exploiting legitimate authorizations of a system entity that invokes the program.

A

Trojan Horse

111
Q

Virus

A

A computer program that can replicate itself, infect a computer without a permission or knowledge of the user, and then spread or propagate the another computer.

112
Q

A computer program that can replicate itself, infect a computer without a permission or knowledge of the user, and then spread or propagate the another computer.

A

Virus

113
Q

Virtual Private Network (VPN)

A

A Virtual Private Network can create secure remote-access and site-to-site connections inexpensively, are a stepping stone to software-defined WANs, and are proving useful in IoT.

114
Q

Creates secure remote-access and site-to-site connections inexpensively, are a stepping stone to software-defined WANs, and are proving useful in IoT.

A

Virtual Private Network (VPN)

115
Q

Vulnerability

A

A characteristic or specific weakness that renders an organization or asset (such as information or an information system) open to exploitation by a given threat or susceptible to a given hazard.

116
Q

A characteristic or specific weakness that renders an organization or asset (such as information or an information system) open to exploitation by a given threat or susceptible to a given hazard.

A

Vulnerability

117
Q

Wide-Area Network (WAN)

A

A network that uses various links-private lines, Multiprotocol Label Switching (MPLS), virtual private networks (VPNs), wireless (cellular), the Internet - to connect organizations’ geographically distributed sites. In an enterprise, a WAN could connect branch offices and individual remote workers with headquarters or the data center.

118
Q

A network that uses various links-private lines, Multiprotocol Label Switching (MPLS), virtual private networks (VPNs), wireless (cellular), the Internet - to connect organizations’ geographically distributed sites. In an enterprise, a WAN could connect branch offices and individual remote workers with headquarters or the data center.

A

Wide-Area Network (WAN)

119
Q

Zero-Touch Provisioning (ZTP)

A

A switch feature that enables automation of provisioning and configuration.

120
Q

A switch feature that enables automation of provisioning and configuration.

A

Zero-Touch Provisioning (ZTP)