• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/20

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

20 Cards in this Set

  • Front
  • Back

Which of the following characteristics relates to access control?

The process or mechanism of granting or denying use of resources; typically applied to users or generic network traffic

Which term describes an object, computer, program, piece of data, or other logical or physical component you use in a business process to accomplish a business task?

Asset

When conducting an audit, the auditor should be which of the following?
An external person who is independent of the organization under audit
Which of the following describes authentication?

The process of confirming the identity of a user

Which term describes when a system is usable for its intended purpose?
Availability
Which of the following is the name given to unauthorized access to a system unofficially with no bad intent?

Backdoor

Which of the following describes a blacklist?

A type of filtering in which all activities or entities are permitted except those identified

Which term describes a network device that forwards traffic between networks based on the MAC address of the Ethernet frame?

Bridge

Which of the following describes caching?

Retention of Internet content by a proxy server

Which of the following characteristics relates to a demilitarized zone (DMZ)?

A type of perimeter network used to host resources designated as accessible by the public from the Internet

Which of the following refers to a form of attack that attempts to compromise availability?
Denial of service (DoS)
Which of the following refers to filtering traffic as it attempts to leave a network, which can include monitoring for spoofed addresses, malformed packets, unauthorized ports and protocols, and blocked destinations?
Egress filtering
A security policy is important for all of the following reasons except which one?
With it, you cannot trust the network's security.
Which term is used to describe a network security device or host software that filters communications, usually network traffic, based on a set of predefined rules?
Firewall

Which of the following terms refers to the process of securing or locking down a host against threats and attacks?

Hardening

Integrity prevents unauthorized changes to data.

True

The term monitoring refers to the act of creating or recording events into a log.

False

A chokepoint is a form of bottleneck and is a single, controlled pathway between two different levels of network trust where a firewall or other filtering devices block or allow traffic based on a set of rules.

True

Intrusion Detection System (IDS) is a security mechanism that detects unauthorized user activities, attacks, and network compromises.

True

The term zero day exploit describes a new and previously unknown attack for which there is not a current specific defense.

True