Term
Layer 5 of the OSI model is |
|
Definition
|
|
Term
Layer 3 of the OSI model is |
|
Definition
|
|
Term
|
Definition
a standard network device for connecting multiple Ethernet devices together by using twisted-pair copper or fiber-optic cables in order to make them function as a single network segment. |
|
|
Term
|
Definition
a network device that can forward packets across computer networks. |
|
|
Term
|
Definition
a technology that can help to evenly distribute work across a network. |
|
|
Term
What does Stateful packet filtering do? |
|
Definition
It keeps a record of the state of a connection between an internal computer and an external device and then makes decisions based on the connection as well as the conditions. |
|
|
Term
|
Definition
a computer or an application program that intercepts a user request from the internal secure network and then processes that request on behalf of the user |
|
|
Term
A reverse proxy does not ______ |
|
Definition
serve clients, but instead routes incoming requests to the correct server. |
|
|
Term
|
Definition
it encrypts all data that is transmitted between the remote device and the network. |
|
|
Term
|
Definition
the end of the tunnel between VPN devices. |
|
|
Term
A Web security gateway can |
|
Definition
block malicious content in “real time” as it appears without first knowing the URL of a dangerous site. |
|
|
Term
Signature- based monitoring is |
|
Definition
Examining network traffic, activity, transactions, or behavior and looking for well-known patterns |
|
|
Term
Each operation in a computing environment starts with ____ |
|
Definition
|
|
Term
|
Definition
a technique that allows private IP addresses to be used on the public Internet |
|
|
Term
What are Private IP addresses? |
|
Definition
IP addresses that are not assigned to any specific user or organization. |
|
|
Term
|
Definition
typically used on home routers that allow multiple users to share one IP address received from an Internet service provider (ISP). |
|
|
Term
In order to allow untrusted outside users access to resources such as Web servers, most networks employ a ____ |
|
Definition
|
|
Term
IP addresses are __-bit addresses |
|
Definition
|
|
Term
Workgroup switches are ________ to the devices on a network |
|
Definition
|
|
Term
A VLAN allows scattered users to ____ |
|
Definition
be logically grouped together even though they may be attached to different switches. |
|
|
Term
Remote access provides remote users with ______ |
|
Definition
the same access and functionality as local users through a VPN or dial-up connection. |
|
|
Term
|
Definition
The most common protocol suite used today for local area networks (LANs) as well as the Internet |
|
|
Term
IP is the protocol that _______ |
|
Definition
functions primarily at the Open Systems Interconnection (OSI) Network Layer. |
|
|
Term
|
Definition
the main Transport Layer protocol that is responsible for establishing connections and the reliable data transport between devices. |
|
|
Term
|
Definition
|
|
Term
SNMP agents are protected with |
|
Definition
a password known as a community string in order to prevent unauthorized users from taking control over a device. |
|
|
Term
|
Definition
a database, organized as a hierarchy or tree, of the name of each site on the Internet and its corresponding IP number. |
|
|
Term
DNS poisoning can be prevented by _____ |
|
Definition
using the latest editions of the DNS software known as BIND. |
|
|
Term
|
Definition
the FTP control port used for passing FTP commands. |
|
|
Term
|
Definition
packets across computer networks. |
|
|
Term
Routers operate at the ______ Layer |
|
Definition
|
|
Term
A flood guard is a feature that _____ |
|
Definition
controls a device’s tolerance for unanswered service requests and helps to prevent a DoS attack. |
|
|
Term
A DNS log can create what? |
|
Definition
entries in a log for all queries that are received. |
|
|
Term
Firewall logs can be used to do what? |
|
Definition
determine whether new IP addresses are attempting to probe the network |
|
|
Term
Broadcast storms can be prevented with |
|
Definition
|
|
Term
It is possible to segment a network by _____ |
|
Definition
physical devices grouped into logical units through a VLAN. |
|
|
Term
IEEE 802.1x provides a greater degree of security by |
|
Definition
implementing port-based authentication. |
|
|
Term
|
Definition
a means of managing and presenting computer resources by function without regard to their physical layout or location. |
|
|
Term
Server virtualization typically relies on what? |
|
Definition
the kernel, which is software that runs on a physical computer to manage one or more virtual machine operating systems. |
|
|
Term
|
Definition
a pay-per-use computing model in which customers pay only for the computing resources they need. |
|
|
Term
In the Cloud Software as a Service model, the cloud computing vendor provides |
|
Definition
access to the vendor’s software applications running on a cloud infrastructure. |
|
|
Term
In the Cloud Infrastructure as a Service cloud computing model, the customer has |
|
Definition
the highest level of control. |
|
|
Term
|
Definition
a Personal Area Network technology designed for data communication over short distances. |
|
|
Term
Most bluetooth devices use |
|
Definition
a Class 2 radio that has a range of 33 feet. |
|
|
Term
The IEEE 802.15.1-2005 Wireless Personal Area Network standard was based on |
|
Definition
the bluetooth v1.2 specifications. |
|
|
Term
|
Definition
Slave devices that are connected to the piconet and are sending transmissions |
|
|
Term
|
Definition
A group of piconets in which connections exist between different |
|
|
Term
|
Definition
an attack that sends unsolicited messages to Bluetooth-enabled devices. |
|
|
Term
|
Definition
an attack that accesses unauthorized information from a wireless device through a Bluetooth connection, often between cell phones and laptop computers. |
|
|
Term
|
Definition
the “base station” for the wireless network |
|
|
Term
|
Definition
an unauthorized AP that allows an attacker to bypass many of the network security configurations and opens the network and its users to attacks. |
|
|
Term
|
Definition
an AP that is set up by an attacker. |
|
|
Term
What does a device do when it receives a beacon frame from an AP? |
|
Definition
the device sends a frame known as an association request frame to the AP. |
|
|
Term
The SSID can generally be |
|
Definition
any alphanumeric string from 2 to 32 characters. |
|
|
Term
|
Definition
detect any changes in a packet, whether accidental or intentional |
|
|
Term
|
Definition
the encryption protocol standard for WPA2 |
|
|
Term
|
Definition
a framework for transporting authentication protocols instead of the authentication protocol itself. |
|
|
Term
EAP request packets are issued by |
|
Definition
|
|
Term
|
Definition
a field that indicates the function of the packet and an identifier field used to match requests and responses |
|
|
Term
|
Definition
mutual authentication used for WLAN encryption using Cisco client software. |
|
|
Term
|
Definition
a more flexible EAP scheme because it creates an encrypted channel between the client and the authentication server. |
|
|
Term
Rogue access points are serious threats to network security because |
|
Definition
they allow attackers to intercept the RF signal and bypass network security to attack the network or capture sensitive data. |
|
|
Term
|
Definition
a single access point to service different types of users. |
|
|
Term
|
Definition
A user or a process functioning on behalf of the user that attempts to access an |
|
|
Term
|
Definition
the action that is taken by the subject over the object. |
|
|
Term
An access control model is |
|
Definition
a standard that provides a predefined framework for hardware and software developers who need to implement access control in their devices or applications. |
|
|
Term
Mandatory Access Control is |
|
Definition
the most restrictive access control model. |
|
|
Term
In the UAC dialog boxes, the color gray indicates |
|
Definition
|
|
Term
|
Definition
|
|
Term
Role Based Access Control is |
|
Definition
considered a more “real world” access control than the other models because the access is based on a user’s job function within an organization. |
|
|
Term
Rule Based Access Control is |
|
Definition
often used for managing user access to one or more systems. |
|
|
Term
A user under Role Based Access Control can be assigned |
|
Definition
|
|
Term
Separation of duties requires ____ |
|
Definition
that if the fraudulent application of a process could potentially result in a breach of security, then the process should be divided between two or more individuals. |
|
|
Term
|
Definition
a set of permissions that are attached to an object. |
|
|
Term
|
Definition
user accounts that remain active after an employee has left an organization. |
|
|
Term
Account expiration indicates when |
|
Definition
an account is no longer active. |
|
|
Term
A user accessing a computer system |
|
Definition
present credentials or identification when logging on to the system. |
|
|
Term
|
Definition
suitable for what are called “high-volume service control applications” such as dial-in access to a corporate network. |
|
|
Term
During RADIUS authentication the AP, serving as the authenticator that will accept or reject the wireless device, creates |
|
Definition
a data packet from this information called the authentication request. |
|
|
Term
|
Definition
an authentication system developed by the Massachusetts Institute of Technology (MIT) and used to verify the identity of networked users. |
|
|
Term
|
Definition
an authentication service commonly used on UNIX devices that communicates by forwarding user authentication information to a centralized server |
|
|
Term
Entries in the DIB are arranged in a tree structure called |
|
Definition
|
|
Term
The X.500 standard defines a protocol for a client application to access an X.500 directory called |
|
Definition
|
|
Term
LDAP injection attacks may allow an attacker to |
|
Definition
construct LDAP statements based on user input statements |
|
|
Term
|
Definition
a secret combination of letters, numbers, and/or characters that only the user should know. |
|
|
Term
The weakness of passwords |
|
Definition
|
|
Term
|
Definition
also capture transmissions that contain passwords |
|
|
Term
|
Definition
the set of letters, symbols, and characters that make up the password |
|
|
Term
Due to the limitations of online guessing, most password attacks today use ___ |
|
Definition
|
|
Term
|
Definition
where every possible combination of letters, numbers, and characters is used to create encrypted passwords. |
|
|
Term
|
Definition
slightly alter dictionary words by adding numbers to the end of the password, spelling words backward, slightly misspelling words, or including special characters such as @, $, !, or %. |
|
|
Term
Although brute force and dictionary attacks were once the primary tools used by attackers to crack an encrypted password, today attackers usually prefer |
|
Definition
|
|
Term
To create a rainbow table, each chain begins with |
|
Definition
an initial password that is encrypted. |
|
|
Term
|
Definition
use fingerprints or other unique characteristics of a person’s face, hands, or eyes (irises and retinas) to authenticate a user. |
|
|
Term
|
Definition
the time it takes for a key to be pressed and then released. |
|
|
Term
Speech recognition accepts |
|
Definition
spoken words for input as if they had been typed on the keyboard |
|
|
Term
If a user typically accesses his bank’s Web site from his home computer on nights and weekends, then this information can be used to |
|
Definition
establish a computer footprint of typical access. |
|
|
Term
|
Definition
related to the perception, thought process, and understanding of the user. |
|
|
Term
It is predicted that cognitive biometrics could become |
|
Definition
a key element in authentication in the future. |
|
|
Term
|
Definition
using a single authentication credential that is shared across multiple networks. |
|
|
Term
|
Definition
reducing the number of usernames and passwords that users must memorize |
|
|
Term
Windows Live ID was originally designed as |
|
Definition
a federated identity management system that would be used by a wide variety of Web servers. |
|
|
Term
Microsoft is Windows CardSpace is |
|
Definition
a feature of Windows that is intended to provide users with control of their digital identities while helping them to manage privacy. |
|
|
Term
|
Definition
share resources stored on one site with a second site without forwarding their authentication credentials to the other site. |
|
|
Term
|
Definition
an operating system that has been reengineered so that it is designed to be secure from the ground up. |
|
|