• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/21

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

21 Cards in this Set

  • Front
  • Back
What are the 3 types of network controls?
1. Preventative Controls
2. Detective Controls
3. Corrective Controls
What 2 ways must controls be periodically reviewed?
1. Verification
2. Testing
What is the process of making a network more secure by comparing each security threat with the control designed to reduce it?
Risk Assesment
What are examples of components that provide redundancy?
1. Uninterruptible power supplies (UPS)
2. Fault-tolerant servers
3. Disk mirroring
4. Disk duplexing
What is the key to reducing disruption, destruction and disaster?
Redundancy
<blank> attach themselves to documents and become active when the files are opened.
Macroviruses
What are 4 types of intruders that attempt to gain unauthorized access to computer networks?
1. Casual Hackers
2. Security Experts
3. Professional Hackers
4. Organization Employees
What do you call braking into a system simply by asking how?
Social Engineering
What are 4 ways to control dial-in security?
1. Routinely change modem numbers
2. Call-back modems
3. Automatic number identification (ANI)
4. One-time passwords
What do you call a packet-level firewall?
Packet filters
In what way are packet filters vulnerable?
IP spoofing - changing the source address on incoming packets from the real address to an address inside the network
What do you use to shield a private network from outside interference?
Network Address Translation (NAT)
What are the 4 main components of encryption?
1. Plaintext - unencrypted message
2. Encryption algorithm
3. Key
4. Ciphertext - encrypted text
What are the 3 important encryption techniques?
1. Symmetric
2. Asymmetric
3. Digital signatures
Which type of encryption uses the same algorithm and key to both encrypt and decrypt a message?
Symmetric
What is a common way to crack symmetric encryption?
Brute Force - trying all possible combinations until one is found.
Which form of encryption uses a public key and a private key?
Asymmetric
What are 3 other encryption techniques?
1. Pretty Good Privacy (PGP)
2. Secure Sockets Layer (SSL)
3. IP Security Protocol (IPSec)
What are the 4 steps of Secure Sockets Layer (SSL)?
1. Negotiation
2. Authentication
3. Symmetric Key Exchange
4. Symmetric Key Encryption w/ digital signature
What are 3 types of Intrusion Detection Systems (IDS)?
1. Network-based IDSs
2. Host-based IDSs
3. Application-based IDSs
What are the 2 main techniques of intrusion detection systems?
1. Misuse detection - looks for signatures of known attacks
2. Anomaly detection - looks for deviation from the norm