Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
31 Cards in this Set
- Front
- Back
What is a DMZ |
Demilitarized zone |
|
What is the name of areas that have good and bad wireless coverage |
Hot and cold zones |
|
What is it called when testing wireless covergae |
Site survey |
|
What is a honeynet |
A network of honeypots |
|
What is PAT |
Allows a single public IP address to be used by many host on a private network. |
|
What is physical isolation |
Physically take a device off the network and don't put it back on (unplug) |
|
What is a VLAN? |
Logically separates a network |
|
What are virtual machines good for? |
Testing different things, reallocating resources and reverting back to previous build |
|
What I'd a proxy server? |
Go between. Caches web pages locally to speed up a request. Also acts a content filter. |
|
Types of network sensors? |
Temperature, movement, humidity |
|
What is an internet content filter? |
White list / blacklist |
|
Where is the firewall usually located in a Network? |
On the outside as it is the first thing to be hit. |
|
What is an aggregation switch |
A switch that combines all the connections on the network. Plug one switch into router and get multiple port connections |
|
What is a mirrored port |
Copy's traffic that flows through port. Copied to a NIDS to detect attacks |
|
Advantages of software defined nwtworking |
Scalable. More efficient and more comouting |
|
What does a hardware security module do (HSM) |
Performs encryption suck as VPN or encryption authoroties |
|
What is a BIOS |
Basic firmware used to boot into a computer and give basic instructions |
|
What Is UEFI |
Replaced BIOS and uses secure boot |
|
What is secure boot |
Protects pc from booting into untrusted boot loaders, helps stop malisciiuous loaders |
|
What is a Kiost OS |
Mainly focussed on UI and generally touchscreen compatible |
|
What is a mobile OS |
Focused for phones and tablets and utilise touch screen |
|
What should you do if you are not using specific ports? |
Disable thwm. Protects against vulnerabilities / interference with other services |
|
What is "least functionality" |
Giving the bare amount of a access that something or someone needa |
|
What is a trusted OS |
Os that fits government regulations and prevents the comingling of certain types of data |
|
What is application whitelisting |
Process where only company approved applications can be run on corporate computer |
|
What should you do with default accounts |
Change username and password or even delete the account |
|
What is a password policy? |
Set requirements a password needs to meet. E g. Length , complexity, expiry time |
|
What is sandboxing? |
Testing environment to isolate untested chnages / experimentarion |
|
Phases of Staging environments |
Development / testing / demo / staging / production |
|
What is a security baseline |
A standard that needs to be met based on previous |
|
Eh |
Rhe |