Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
20 Cards in this Set
- Front
- Back
Which of the following characteristics relates to access control? |
The process or mechanism of granting or denying use of resources; typically applied to users or generic network traffic |
|
Which term describes an object, computer, program, piece of data, or other logical or physical component you use in a business process to accomplish a business task? |
Asset |
|
When conducting an audit, the auditor should be which of the following?
|
An external person who is independent of the organization under audit
|
|
Which of the following describes authentication?
|
The process of confirming the identity of a user |
|
Which term describes when a system is usable for its intended purpose?
|
Availability
|
|
Which of the following is the name given to unauthorized access to a system unofficially with no bad intent?
|
Backdoor |
|
Which of the following describes a blacklist?
|
A type of filtering in which all activities or entities are permitted except those identified |
|
Which term describes a network device that forwards traffic between networks based on the MAC address of the Ethernet frame? |
Bridge |
|
Which of the following describes caching? |
Retention of Internet content by a proxy server |
|
Which of the following characteristics relates to a demilitarized zone (DMZ)? |
A type of perimeter network used to host resources designated as accessible by the public from the Internet |
|
Which of the following refers to a form of attack that attempts to compromise availability?
|
Denial of service (DoS)
|
|
Which of the following refers to filtering traffic as it attempts to leave a network, which can include monitoring for spoofed addresses, malformed packets, unauthorized ports and protocols, and blocked destinations?
|
Egress filtering
|
|
A security policy is important for all of the following reasons except which one?
|
With it, you cannot trust the network's security.
|
|
Which term is used to describe a network security device or host software that filters communications, usually network traffic, based on a set of predefined rules?
|
Firewall
|
|
Which of the following terms refers to the process of securing or locking down a host against threats and attacks? |
Hardening
|
|
Integrity prevents unauthorized changes to data. |
True |
|
The term monitoring refers to the act of creating or recording events into a log. |
False |
|
A chokepoint is a form of bottleneck and is a single, controlled pathway between two different levels of network trust where a firewall or other filtering devices block or allow traffic based on a set of rules. |
True |
|
Intrusion Detection System (IDS) is a security mechanism that detects unauthorized user activities, attacks, and network compromises. |
True |
|
The term zero day exploit describes a new and previously unknown attack for which there is not a current specific defense. |
True |