Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
| low-end hardware firewall |
|
|
Term
|
Definition
| high end hardware firewall |
|
|
Term
|
Definition
|
|
Term
|
Definition
| causes potential virus to be isolated |
|
|
Term
|
Definition
uppercase english alphabetic characters
lowercase english alphabrtic characters
numeric digits
Non-alphanumeric characters |
|
|
Term
|
Definition
-is used for the sole purpose of intrusion detection. A honeypot is a system or program that has no real functional value but is only installed or implemented as a means to detect intrusion |
|
|
Term
|
Definition
| in active directory are used to control which resources users are allowed to access. This makes managing permissions easier because you can create a security group and then apply permissions only once for the entire group of users |
|
|
Term
|
Definition
|
|
Term
|
Definition
| used to allow e-mail messages to be routed to different groups of users |
|
|
Term
|
Definition
| Read Only Domain Controller |
|
|
Term
| For what purpose would you deploy an RODC |
|
Definition
| To restrict domain controller access for physically remote location |
|
|
Term
|
Definition
| self replicating and does not require a host program to spread through a network |
|
|
Term
|
Definition
| website deployed on your network are part of the this zone, as long as you can access them by URL path |
|
|
Term
|
Definition
| includes all web sites that are not part of your network and not assigned to a different zone |
|
|
Term
|
Definition
| contains thoses web sites that you have identified as safe |
|
|
Term
|
Definition
|
|
Term
|
Definition
| uses digitial signatures to provide security for DNS communications and helps to minimize the likelihood of man-in-the-middle attacks. Also , uses digitial signature to validate the orgin and data integrity for DNS communications |
|
|
Term
|
Definition
| configured from software included with the operating system |
|
|
Term
|
Definition
| authentication protocol. issues time stamped tickets when authenticating clients |
|
|
Term
NAP
(Network Access Protection) |
|
Definition
| used to check the status of a clients windows updates |
|
|
Term
|
Definition
| contains a list of emails addresses and domains that the anti spam filter always assume to be spam |
|
|
Term
SSL
(secure socket layer) |
|
Definition
| provides security for data that is transmitted over the internet |
|
|
Term
WPA
(WI-FI protected access)
|
|
Definition
| provides the highest level of security. Also, provides authentication and for the encryption keys that are used for data encryption |
|
|
Term
|
Definition
| used to implement packet filtering of packets sent from and receive on the network |
|
|
Term
WEP
(wireless equivalent Privacy) |
|
Definition
| less secure than one that implements WI-FI protected access (WPA or WPA2) |
|
|
Term
| what reason is physical security extremely important with laptops and other mobile devices? |
|
Definition
| They can be lost or stolen |
|
|
Term
|
Definition
| monitoring network communications to collect information about the network and collect the content of network packets |
|
|
Term
| what action should you take to keep communication secure |
|
Definition
| fiber optic cable to wire unsecured segment |
|
|
Term
|
Definition
| the process of making changes to the operating system, network, or applications in order to reduce vulnerability |
|
|
Term
SPF
(sender policy framework)
|
|
Definition
| DNS record is used to prevent hackers from using your network's e-mail servers as a platform for send spam with your domain |
|
|
Term
|
Definition
| an attempt to get a user to reveal personal or financial information |
|
|
Term
|
Definition
| provides more felixibility than software restriction policies, but also allows you to control what software the users are allowed to install and run |
|
|
Term
| Software restriction policies |
|
Definition
| used to control what software users are allowed to install and run |
|
|
Term
| what represents a security threat to your DNS environment |
|
Definition
|
|
Term
| which wireless security method uses temporal key integrity (TKIP) encryption |
|
Definition
|
|
Term
| how are siftware restricions policies used? |
|
Definition
| To control which software a user can execute |
|
|
Term
| LL users have been denied all permissions to a file. you need to access the file as quickly as possible. you are logged on as an administrator. what should you do first |
|
Definition
| Take owernship of the file |
|
|
Term
VLAN
(virtual local area network) |
|
Definition
| treats the included computers as if they are all part of the same subnet |
|
|
Term
| SYSKEY improves physical security by requiring a password or special floppy disk to? |
|
Definition
|
|
Term
HRA
(health registration authority) |
|
Definition
| responsible for validating and requesting a helth certificate for complaint clients. Also, validents client credentials and send a request for a health certificate to a certificate authority |
|
|
Term
|
Definition
| defines how long, in days, that a user is able to use a password. |
|
|
Term
| a strong password contains |
|
Definition
| Letters,numbers, and special characters |
|
|
Term
| You would use a security group to? |
|
Definition
| allow only specific users to access specific network resources |
|
|
Term
|
Definition
| are typically used as part of a multifactor authentication solution |
|
|
Term
|
Definition
| is used to deploy public resources while isolating the internal network |
|
|
Term
| you need to implement security measures to provide maxium protection for client computers |
|
Definition
| ensure that all computers have the most recent updates |
|
|
Term
| what would be the best approach to minimize the likelihood of a client computer being infected with a virus |
|
Definition
| restrict the attachment that an email user can receive |
|
|
Term
| What would you use to ensure that specific web sites do not have access to user browser patterns |
|
Definition
|
|
Term
| what is the primary purpose of a firewall |
|
Definition
| to protect the network by restricting incoming and outgoing network traffic |
|
|
Term
| you want to ensure that mbile clients receive timely operating system updates. some clients rarely connect to the internal business network. what should you use? |
|
Definition
WUA
(windows update agent) |
|
|
Term
| you use microsoft outlook as the email client for your company. you use external email server provide by your internet service provider. you want to pervent virus infection on computers in your active directory? |
|
Definition
| Install a antivirus program on each client computer |
|
|
Term
| to deploy network access protection (NAP), you must have? |
|
Definition
| A NAP health policy server |
|
|
Term
| what will happen when you move a file you encrypted through the encrypting file system (EFS) to an unencrypted folder on an NTFS parition? |
|
Definition
| The file remains encrypted |
|
|
Term
| what would reduce the likelihood hood of a sniffer attack? |
|
Definition
| encrypting data transmitted over the network |
|
|
Term
| typically used as part as a multifactor authentication solution |
|
Definition
|
|
Term
| you need to secure your wireless network, which provides highest level of security |
|
Definition
|
|
Term
| using trusted platform module(TPM)ensures |
|
Definition
| hardware encryption of data |
|
|
Term
| example of least privilege |
|
Definition
| logging on as a limited user instead of an administrator to run apllications |
|
|
Term
| example of biometric security |
|
Definition
|
|
Term
| when should you use Group policy editor |
|
Definition
| when establishing audit policy that should be applied across the domain |
|
|
Term
| which two permissions are consider basic NTFS file permissions |
|
Definition
|
|
Term
|
Definition
| a self-replicating computer virus |
|
|
Term
|
Definition
| authentication protocol is used for interactive logon,including smart card logon, or current windows versions |
|
|
Term
| how to minimize the attack surface for your network |
|
Definition
| ensuring that only require features are enabled |
|
|
Term
| to ensure that user cannot connect to a rouge wireless access point, you should? |
|
Definition
| install a wireless intrusion prevention system |
|
|
Term
| you want to prevent users who are running windows vista and windows 7 on your corporate network from copying sensitive data to removable devices |
|
Definition
| define a group policy to control wire access to removable media |
|
|
Term
| Microsoft Baseline security analyzer |
|
Definition
| a tool on a server or on clients to ensure that all security updates have been applied and identify potential security issues |
|
|
Term
|
Definition
| monitoring network communications to collect information about the network and collect the content of the network packet |
|
|
Term
|
Definition
| a third system monitors communication between a client and a server until it can take over one end of the communication session |
|
|
Term
|
Definition
|
|
Term
|
Definition
| active process of trying overload a network or a server with traffic |
|
|
Term
|
Definition
| users being authenticate with the server an vise versa |
|
|
Term
| two common type of virus infections |
|
Definition
| New Icons appears spontaneously on the desktop; an install antivirus program is disabled and will not restart |
|
|
Term
|
Definition
| used to provide encryption for removable media storage devices |
|
|
Term
|
Definition
| refers to preventing data from being tampered with and detecting tempering if occurred |
|
|
Term
|
Definition
| attempt to make sure that data and servers are available at all times |
|
|
Term
|
Definition
| security services that guarantee data origin and validate the identity of users or other persons |
|
|
Term
|
Definition
| security service that protect against unauthorized disclosure of data |
|
|
Term
|
Definition
|
|
Term
|
Definition
| records every user stroke |
|
|
Term
|
Definition
| an application that appears to be one thing but is something else |
|
|
Term
| UAC (user account control) |
|
Definition
| Can provide elevation of privileges |
|
|
Term
| in which situation would you typically use a stand alone certificate authority in you public key infrastructure design |
|
Definition
| when issuing certificates to users outside of your domain |
|
|
Term
|
Definition
| encapsulates packets of one protocol inside another protocol |
|
|
Term
|
Definition
| attacks involve user being contacted,either via e-mail,internet, telephone, or in person, and being ask for confidential informational |
|
|