Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
52 Cards in this Set
- Front
- Back
What are the three types of patches?
|
Service Pack – Periodic update, corrects known problems.
Updates – Fixes for individual customers Security updates – Address security vulnerabilities |
|
What is hardening?
|
The process of securing a system by reducing its surface of vulnerability. (i.e. removing unwanted software, disabling unneeded services, etc)
|
|
What are alerts?
|
Issues you need to pay attention to, but are not immediately critical.
|
|
What are alarms?
|
Indications of ongoing, current problems.
|
|
Define:
EAPOL |
Extensible Authentication Protocol Over LAN
|
|
What is a:
Network Monitor |
Also known as sniffers, they were originally introduced to help troubleshoot network problems.
|
|
What is:
Promiscuous mode |
A mode in which the network card looks at any packet that it sees on the network, even if that packet is not addressed to that network card
|
|
What are:
Event Logs |
System logs that record various events that occur
|
|
What is the:
Windows Application Log |
Contains various events logged by applications or programs
|
|
What is the:
Windows Security Log |
Logs successful and unsuccessful logon attempts , events related to resource use (such as creating, opening, or deleting files or other objects)
|
|
What is:
Performance Monitor |
A utility that can be used to examine activity on any counter (i.e. processor or RAM usage)
|
|
What are four aspects of a security audit?
|
Review of security logs
Review of policies and compliance with policies A check of security device configuration Review of incident response reports |
|
What are the three classifications of security gaps?
|
Minor – This is a deviation from the security baseline that does not pose an immediate threat
Serious – This is a deviation that could pose an immediate threat, but is unlikely or difficult Critical – This is a deviation that poses an immediate threat that must be addressed ASAP |
|
What are the three types of patches?
|
Service Pack – Periodic update, corrects known problems.
Updates – Fixes for individual customers Security updates – Address security vulnerabilities |
|
What is hardening?
|
The process of securing a system by reducing its surface of vulnerability. (i.e. removing unwanted software, disabling unneeded services, etc)
|
|
What are alerts?
|
Issues you need to pay attention to, but are not immediately critical.
|
|
What are alarms?
|
Indications of ongoing, current problems.
|
|
Define:
EAPOL |
Extensible Authentication Protocol Over LAN
|
|
What is a:
Network Monitor |
Also known as sniffers, they were originally introduced to help troubleshoot network problems.
|
|
What is:
Promiscuous mode |
A mode in which the network card looks at any packet that it sees on the network, even if that packet is not addressed to that network card
|
|
What are:
Event Logs |
System logs that record various events that occur
|
|
What is the:
Windows Application Log |
Contains various events logged by applications or programs
|
|
What is the:
Windows Security Log |
Logs successful and unsuccessful logon attempts , events related to resource use (such as creating, opening, or deleting files or other objects)
|
|
What is:
Performance Monitor |
A utility that can be used to examine activity on any counter (i.e. processor or RAM usage)
|
|
What are four aspects of a security audit?
|
Review of security logs
Review of policies and compliance with policies A check of security device configuration Review of incident response reports |
|
What are the three classifications of security gaps?
|
Minor – This is a deviation from the security baseline that does not pose an immediate threat
Serious – This is a deviation that could pose an immediate threat, but is unlikely or difficult Critical – This is a deviation that poses an immediate threat that must be addressed ASAP |
|
What are the three types of patches?
|
Service Pack – Periodic update, corrects known problems.
Updates – Fixes for individual customers Security updates – Address security vulnerabilities |
|
What are the three types of patches?
|
Service Pack – Periodic update, corrects known problems.
Updates – Fixes for individual customers Security updates – Address security vulnerabilities |
|
What is hardening?
|
The process of securing a system by reducing its surface of vulnerability. (i.e. removing unwanted software, disabling unneeded services, etc)
|
|
What are alerts?
|
Issues you need to pay attention to, but are not immediately critical.
|
|
What are alarms?
|
Indications of ongoing, current problems.
|
|
Define:
EAPOL |
Extensible Authentication Protocol Over LAN
|
|
What is a:
Network Monitor |
Also known as sniffers, they were originally introduced to help troubleshoot network problems.
|
|
What is:
Promiscuous mode |
A mode in which the network card looks at any packet that it sees on the network, even if that packet is not addressed to that network card
|
|
What are:
Event Logs |
System logs that record various events that occur
|
|
What is the:
Windows Application Log |
Contains various events logged by applications or programs
|
|
What is the:
Windows Security Log |
Logs successful and unsuccessful logon attempts , events related to resource use (such as creating, opening, or deleting files or other objects)
|
|
What is:
Performance Monitor |
A utility that can be used to examine activity on any counter (i.e. processor or RAM usage)
|
|
What are four aspects of a security audit?
|
Review of security logs
Review of policies and compliance with policies A check of security device configuration Review of incident response reports |
|
What are the three classifications of security gaps?
|
Minor – This is a deviation from the security baseline that does not pose an immediate threat
Serious – This is a deviation that could pose an immediate threat, but is unlikely or difficult Critical – This is a deviation that poses an immediate threat that must be addressed ASAP |
|
What is hardening?
|
The process of securing a system by reducing its surface of vulnerability. (i.e. removing unwanted software, disabling unneeded services, etc)
|
|
What are alerts?
|
Issues you need to pay attention to, but are not immediately critical.
|
|
What are alarms?
|
Indications of ongoing, current problems.
|
|
Define:
EAPOL |
Extensible Authentication Protocol Over LAN
|
|
What is a:
Network Monitor |
Also known as sniffers, they were originally introduced to help troubleshoot network problems.
|
|
What is:
Promiscuous mode |
A mode in which the network card looks at any packet that it sees on the network, even if that packet is not addressed to that network card
|
|
What are:
Event Logs |
System logs that record various events that occur
|
|
What is the:
Windows Application Log |
Contains various events logged by applications or programs
|
|
What is the:
Windows Security Log |
Logs successful and unsuccessful logon attempts , events related to resource use (such as creating, opening, or deleting files or other objects)
|
|
What is:
Performance Monitor |
A utility that can be used to examine activity on any counter (i.e. processor or RAM usage)
|
|
What are four aspects of a security audit?
|
Review of security logs
Review of policies and compliance with policies A check of security device configuration Review of incident response reports |
|
What are the three classifications of security gaps?
|
Minor – This is a deviation from the security baseline that does not pose an immediate threat
Serious – This is a deviation that could pose an immediate threat, but is unlikely or difficult Critical – This is a deviation that poses an immediate threat that must be addressed ASAP |