• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/31

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

31 Cards in this Set

  • Front
  • Back

What is a DMZ

Demilitarized zone

What is the name of areas that have good and bad wireless coverage

Hot and cold zones

What is it called when testing wireless covergae

Site survey

What is a honeynet

A network of honeypots

What is PAT

Allows a single public IP address to be used by many host on a private network.

What is physical isolation

Physically take a device off the network and don't put it back on (unplug)

What is a VLAN?

Logically separates a network

What are virtual machines good for?

Testing different things, reallocating resources and reverting back to previous build

What I'd a proxy server?

Go between. Caches web pages locally to speed up a request. Also acts a content filter.

Types of network sensors?

Temperature, movement, humidity

What is an internet content filter?

White list / blacklist

Where is the firewall usually located in a Network?

On the outside as it is the first thing to be hit.

What is an aggregation switch

A switch that combines all the connections on the network.



Plug one switch into router and get multiple port connections

What is a mirrored port

Copy's traffic that flows through port. Copied to a NIDS to detect attacks

Advantages of software defined nwtworking

Scalable. More efficient and more comouting

What does a hardware security module do (HSM)

Performs encryption suck as VPN or encryption authoroties

What is a BIOS

Basic firmware used to boot into a computer and give basic instructions

What Is UEFI

Replaced BIOS and uses secure boot

What is secure boot

Protects pc from booting into untrusted boot loaders, helps stop malisciiuous loaders

What is a Kiost OS

Mainly focussed on UI and generally touchscreen compatible

What is a mobile OS

Focused for phones and tablets and utilise touch screen

What should you do if you are not using specific ports?

Disable thwm. Protects against vulnerabilities / interference with other services

What is "least functionality"

Giving the bare amount of a access that something or someone needa

What is a trusted OS

Os that fits government regulations and prevents the comingling of certain types of data

What is application whitelisting

Process where only company approved applications can be run on corporate computer

What should you do with default accounts

Change username and password or even delete the account

What is a password policy?

Set requirements a password needs to meet. E g. Length , complexity, expiry time

What is sandboxing?

Testing environment to isolate untested chnages / experimentarion

Phases of Staging environments

Development / testing / demo / staging / production

What is a security baseline

A standard that needs to be met based on previous

Eh

Rhe