Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
18 Cards in this Set
- Front
- Back
Which system should have personal firewalls setup? |
|
|
Name five features of personal firewalls |
|
|
What are TCP Wrappers? |
Used in Linux to control access to different services i.e. Telnet, SSH, or FTP. Configured in in two files: /etc/hosts.allow, /etc/hosts.deny Remember host.allow is read first |
|
What is HIDS? |
A host-based intrusion detection system that monitors activity (application based anomaly) on the system and alerting about suspicious activity. |
|
Name five of the areas that HIDS monitor? |
|
|
One of the limitation of a network-base IDS is? |
(Packet based anomaly) If the traffic is encrypted the IDS is unable to analyze it and NIDS cannot decipher information. |
|
Does encryption hinder HIDS? |
No Host based software decrypts the encrypted communication and then logs the activity and then HIDS looks for suspicious activity in the unencrypted files. HIDS involves installing an agent on the local host that monitors and reports on the system configuration and application activity |
|
What is the first line of defense against malicious software? |
Antivirus Software |
|
Name four Data Policy elements that should be included in your Security Policy? |
|
|
What is:
|
|
|
What should one consider before storing data in the cloud? |
The company's security policy for storing the data. |
|
What security item must be taken in to account when using a SAN? |
When using a Storage Area Network device close attention must be paid to the configuration. |
|
What security two item must be taken in to account when storing Big Data?
|
Handling Big Data
|
|
What is a big drawback with VoIP? |
VoIP will suffer from delay. |
|
What is Data Loss Prevention (DLP)? |
DLP is a hardware and software solution that performs deep content inspection of data(such as e-mail bodies and attachments to prevent information leakage. |
|
What are Hardware Security Modules (HSM)? |
Devices that are designed to handle cryptographic duties allowing servers to focus on other tasks. |
|
What is the Encrypting File System (EFS)? |
Software used to encrypt data.can be used with NTFS 3.0 |
|
What kind of control is a Firewall? |
Protective |