• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/30

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

30 Cards in this Set

  • Front
  • Back

1.1 IPSEC

1.1 Protocol used to authenticate the IP Addresses and encrypt the payload.
1.1 C. I. A.
1.1 Confidentiality, Integrity and Availability.
1.1 Confidentiality
1.1 Rules that ensure only the individuals that have a need for information can access it.
1.1 Integrity
1.1 The content of the data is accurate.
1.1 Availability
1.1 Access to the data is guaranteed.
Threat
1.1 Potential hazard to IT assets and data.
1.1 Risk
1.1 The impact and likelihood of a threat actually happening.
1.1 Principle of Least Privilege.
1.1 Only give enough capability to accomplish required tasks.
1.1 Social Engineering
1.1 Social skills used to obtain access to IT resources.
1.1 Attack Surface
1.1 The amount of vulnerability your Operating System exposes to IT assets.
1.2 Site Security
1.2 Physical security measures taken to protect IT assets.
1.2 Computer Security
1.2 Protection of data and IT assets.
1.2 Removable devices and drives.
1.2 Disabled ports can reduce threats from portable media.
1.2 Access Control
1.2 Management of access to resources based on granting rights and permissions to users and objects.
1.2 Mobile Device Security
1.2 Protections provided for mobile devices.
1.2 Disable Log on Locally
1.2 Denies a user the right to initiate and interactive session directly on the terminal.
1.2 Key Loggers
1.2 Enables the recording of keystrokes without the users knowledge.
1.3 Browser Settings
1.3 Security options enabled within your browsers settings.
1.3 Zones - Security Zones
1.3 Internet, Local Intranet, Trusted and Restricted Sites.
1.3 Security Zones - Internet
1.3 Sets security for sites accessed from outside the local network.
1.3 Security Zones - Local Intranet
1.3 Sets security for sites contained within your LAN
1.3 Security Zones - Trusted
1.3 Sets minimal security for sites you consider safe. By default no site is considered trusted.
1.3 Security Zones - Restricted Sites
1.3 Sets security for sites you do not trust. Security is very high and by default no sites are considered restricted.
1.3 Secure Web Sites
1.3 A website that can secure or provide confidentiality for the data being transferred.
1.4 Security Types
1.4 WEP, WPA, WPA2, AES, 3DES, DES, TKIP
1.4 Keys
1.4 Passphrase, PSK, 802.1x, Certificate
1.4 WAP
1.4 Wireless Access Point
1.4 SSID

1.4 Name of WAP normally broadcast to devices which is sometime disabled.

1.4 MAC Filters
1.4 Enables you to explicitly allow or deny access to a WAP through the MAC address. Will not protect against eavesdropping or MAC spoofing.
1.4 Security Types - WEP
1.4 Wired Equivalency Protocol - WEP is a weak encryption standard that can be broken after 500000 frames are transmitted. WEP uses and RC4 key for encryption.