Shared Flashcard Set

Details

IT296 - Chapter 08
IT296 - Chapter 08 (Security+)
44
Computer Science
Undergraduate 2
04/23/2016

Additional Computer Science Flashcards

 


 

Cards

Term
access log
Definition
A log that can provide details regarding requests for specific files on a system.
Term
audit log
Definition
A log that is used to record which user performed an action and what that action was.
Term
cloud computing
Definition
A pay-per-use computing model in which customers pay only for the online computing resources that they need, and the resources can be easily scaled.
Term
cloud storage
Definition
A cloud system that has no computational capabilities but provides remote file storage.
Term
community cloud
Definition
A cloud that is open only to specific organizations that have common concerns.
Term
disabling unused interfaces
Definition
A security technique to turn off ports on a network device that are not required.
Term
event log
Definition
Log that documents any unsuccessful events and the most significant successful events.
Term
Fibre Channel (FC)
Definition
A high-speed storage network protocol that can transmit up to 16 gigabits per second.
Term
Fibre Channel over Ethernet (FCoE)
Definition
A high-speed storage network protocol that encapsulates Fibre Channel frames over Ethernet networks.
Term
File Transfer Protocol (FTP)
Definition
An unsecure TCP/IP protocol that is commonly used for transferring files.
Term
flood guard
Definition
A feature that controls a device
Term
FTP Secure (FTPS)
Definition
A TCP/IP protocol that uses Secure Sockets Layer or Transport Layer Security to encrypt commands sent over the control port (port 21) in an FTP session.
Term
host availability
Definition
The ability to quickly make new virtual server machines available.
Term
host elasticity
Definition
The ability to easily expand or contract resources in a virtualized environment.
Term
host virtualization
Definition
A type of virtualization in which an entire operating system environment is simulated.
Term
hybrid cloud
Definition
A combination of public and private clouds.
Term
IEEE 802.1x
Definition
A standard that authenticates users on a per-switch port basis by permitting access to valid users but effectively disabling the port if authentication fails.
Term
Infrastructure as a Service (IaaS)
Definition
A cloud computing model in which customers have the highest level of control and can deploy and run their own software.
Term
Internet Control Message Protocol (ICMP)
Definition
A TCP/IP protocol that is used by devices to communicate updates or error information to other devices.
Term
Internet Protocol version 6 (IPv6)
Definition
The next generation of the IP protocol that addresses weaknesses of IPv4 and provides several significant improvements.
Term
IP telephony
Definition
Using a data-based IP network to add digital voice clients and new voice applications onto the IP network.
Term
iSCSI (Internet Small Computer System Interface)
Definition
An IP-based storage networking standard for linking data storage facilities.
Term
Log
Definition
A record of events that occur.
Term
loop protection
Definition
Technique to prevent broadcast storms by using the IEEE 802.1d standard spanning-tree algorithm (STA).
Term
MAC limiting and filtering
Definition
A security technique to limit the number of media access control (MAC) addresses allowed on a single port.
Term
NetBIOS (Network Basic Input/Output System)
Definition
An older transport protocol used by Microsoft Windows systems for allowing applications on separate computers to communicate over a LAN.
Term
patch compatibility
Definition
The impact of a patch on other software or even hardware.
Term
Platform as a Service (PaaS)
Definition
A cloud service in which consumers can install and run their own specialized applications on the cloud computing network.
Term
private cloud
Definition
A cloud that is created and maintained on a private network.
Term
public cloud
Definition
A cloud in which the services and infrastructure are offered to all users with access provided remotely through the Internet.
Term
rule-based management
Definition
The process of administration that relies on following procedural and technical rules.
Term
Sandboxing
Definition
Using a virtual machine to run a suspicious program to determine if it is malware.
Term
Secure Copy Protocol (SCP)
Definition
A TCP/IP protocol used mainly on UNIX and Linux devices that securely transports files by encrypting files and commands.
Term
Secure FTP (SFTP)
Definition
A secure TCP/IP protocol that is used for transporting files by encrypting and compressing all data and commands.
Term
security control testing
Definition
Testing the existing security configuration.
Term
security log
Definition
Log that can reveal the types of attacks that are being directed at the network and if any of the attacks were successful.
Term
Simple Network Management Protocol (SNMP)
Definition
A TCP/IP protocol that exchanges management information between networked devices. It allows network administrators to remotely monitor, manage, and configure devices on the network.
Term
Snapshot
Definition
An instance of a particular state of a virtual machine that can be saved for later use.
Term
Software as a Service (SaaS)
Definition
A model of cloud computing in which the vendor provides access to the vendor
Term
storage area network (SAN)
Definition
A dedicated network storage facility that provides access to data storage over a high-speed network.
Term
Telnet
Definition
An older TCP/IP protocol and an application used for text-based communication.
Term
Transmission Control Protocol/Internet Protocol (TCP/IP)
Definition
The most common protocol suite used today for local area networks (LANs) and the Internet.
Term
Trivial File Transfer Protocol (TFTP)
Definition
A light version of FTP that uses a small amount of memory and has limited functionality.
Term
Virtualization
Definition
A means of managing and presenting computer resources by function without regard to their physical layout or location.
Supporting users have an ad free experience!