Shared Flashcard Set

Details

98-367 MTA security fundamentals
N/A
88
Computer Networking
Undergraduate 1
09/02/2014

Additional Computer Networking Flashcards

 


 

Cards

Term
Window Firewall
Definition
A stateful Firewall
Term
Classes 1 firewall
Definition
personal firewall
Term
class 2 firewall
Definition
router firewall
Term
class 3 firewall
Definition
low-end hardware firewall
Term
class 4 firewall
Definition
high end hardware firewall
Term
class 5 firewall
Definition
high end server firewall
Term
Quarantine
Definition
causes potential virus to be isolated
Term
Password complexity
Definition

uppercase english alphabetic characters

lowercase english alphabrtic characters

numeric digits

Non-alphanumeric characters

Term
Honeypot
Definition

-is used for the sole purpose of intrusion detection. A honeypot is a system or program that has no real functional value but is only installed or implemented as a means to detect intrusion

Term
Security groups
Definition
in active directory are used to control which resources users are allowed to access. This makes managing permissions easier because you can create a security group and then apply permissions only once for the entire group of users
Term
Encryption algorithm
Definition
used to encrypt data
Term
Distribution groups
Definition
used to allow e-mail messages to be routed to different groups of users
Term
RODC
Definition
Read Only Domain Controller
Term
For what purpose would you deploy an RODC
Definition
To restrict domain controller access for physically remote location
Term
Worm
Definition
self replicating and does not require a host program to spread through a network
Term
Local Intranet
Definition
website deployed on your network are part of the this zone, as long as you can access them by URL path
Term
Internet Zone
Definition
includes all web sites that are not part of your network and not assigned to a different zone
Term
Trusted zones
Definition
contains thoses web sites that you have identified as safe
Term
Restricted zone
Definition
for unsafe websites
Term
DNSsec
Definition
uses digitial signatures to provide security for DNS communications and helps to minimize the likelihood of man-in-the-middle attacks. Also , uses digitial signature to validate the orgin and data integrity for DNS communications
Term
software firewalls
Definition
configured from software included with the operating system
Term
kerberos
Definition
authentication protocol. issues time stamped tickets when authenticating clients
Term

NAP

(Network Access Protection)

Definition
used to check the status of a clients windows updates
Term
Blacklist
Definition
contains a list of emails addresses and domains that the anti spam filter always assume to be spam
Term

SSL

(secure socket layer)

Definition
provides security for data that is transmitted over the internet
Term

WPA

(WI-FI protected access)

 

Definition
provides the highest level of security. Also, provides authentication and for the encryption keys that are used for data encryption
Term
Firewall
Definition
used to implement packet filtering of packets sent from and receive on the network
Term

WEP

(wireless equivalent Privacy)

Definition
less secure than one that implements WI-FI protected access (WPA or WPA2)
Term
what reason is physical security extremely important with laptops and other mobile devices?
Definition
They can be lost or stolen
Term
sniffing
Definition
monitoring network communications to collect information about the network and collect the content of network packets
Term
what action should you take to keep communication secure
Definition
fiber optic cable to wire unsecured segment
Term
Hardening
Definition
the process of making changes to the operating system, network, or applications in order to reduce vulnerability
Term

SPF

(sender policy framework)

 

Definition
DNS record is used to prevent hackers from using your network's e-mail servers as a platform for send spam with your domain
Term
Phishing
Definition
an attempt to get a user to reveal personal or financial information
Term
APPLocker
Definition
provides more felixibility than software restriction policies, but also allows you to control what software the users are allowed to install and run
Term
Software restriction policies
Definition
used to control what software users are allowed to install and run
Term
what represents a security threat to your DNS environment
Definition
Footprinting
Term
which wireless security method uses temporal key integrity (TKIP) encryption
Definition
WPA
Term
how are siftware restricions policies used?
Definition
To control which software a user can execute
Term
LL users have been denied all permissions to a file. you need to access the file as quickly as possible. you are logged on as an administrator. what should you do first
Definition
Take owernship of the file
Term

VLAN

(virtual local area network)

Definition
treats the included computers as if they are all part of the same subnet
Term
SYSKEY improves physical security by requiring a password or special floppy disk to?
Definition
boot the server
Term

HRA

(health registration authority)

Definition
responsible for validating and requesting a helth certificate for complaint clients. Also, validents client credentials and send a request for a health certificate to a certificate authority
Term
maximum password age
Definition
defines how long, in days, that a user is able to use a password.
Term
a strong password contains
Definition
Letters,numbers, and special characters
Term
You would use a security group to?
Definition
allow only specific users to access specific network resources
Term
smart cards
Definition
are typically used as part of a multifactor authentication solution
Term
Perimeter network (DMZ)
Definition
is used to deploy public resources while isolating the internal network
Term
you need to implement security measures to provide maxium protection for client computers
Definition
ensure that all computers have the most recent updates
Term
what would be the best approach to minimize the likelihood of a client computer being infected with a virus
Definition
restrict the attachment that an email user can receive
Term
What would you use to ensure that specific web sites do not have access to user browser patterns
Definition
Inprivate filtering
Term
what is the primary purpose of a firewall
Definition
to protect the network by restricting incoming and outgoing network traffic
Term
you want to ensure that mbile clients receive timely operating system updates. some clients rarely connect to the internal business network. what should you use?
Definition

WUA

(windows update agent)

Term
you use microsoft outlook as the email client for your company. you use external email server provide by your internet service provider. you want to pervent virus infection on computers in your active directory?
Definition
Install a antivirus program on each client computer
Term
to deploy network access protection (NAP), you must have?
Definition
A NAP health policy server
Term
what will happen when you move a file you encrypted through the encrypting file system (EFS) to an unencrypted folder on an NTFS parition?
Definition
The file remains encrypted
Term
what would reduce the likelihood hood of a sniffer attack?
Definition
encrypting data transmitted over the network
Term
typically used as part as a multifactor authentication solution
Definition
smart cards
Term
you need to secure your wireless network, which provides highest level of security
Definition
WPA
Term
using trusted platform module(TPM)ensures
Definition
hardware encryption of data
Term
example of least privilege
Definition
logging on as a limited user instead of an administrator to run apllications
Term
example of biometric security
Definition
fingerprint scan
Term
when should you use Group policy editor
Definition
when establishing audit policy that should be applied across the domain
Term
which two permissions are consider basic NTFS file permissions
Definition
Read; Full control
Term
worm
Definition
a self-replicating computer virus
Term
Kerberos
Definition
authentication protocol is used for interactive logon,including smart card logon, or current windows versions
Term
how to minimize the attack surface for your network
Definition
ensuring that only require features are enabled
Term
to ensure that user cannot connect to a rouge wireless access point, you should?
Definition
install a wireless intrusion prevention system
Term
you want to prevent users who are running windows vista and windows 7 on your corporate network from copying sensitive data to removable devices
Definition
define a group policy to control wire access to removable media
Term
Microsoft Baseline security analyzer
Definition
a tool on a server or on clients to ensure that all security updates have been applied and identify potential security issues
Term
sniffing
Definition
monitoring network communications to collect information about the network and collect the content of the network packet
Term
Hijacking
Definition
a third system monitors communication between a client and a server until it can take over one end of the communication session
Term
spoofing
Definition
obscuring an identity
Term
Flooding
Definition
active process of trying overload a network or a server with traffic
Term
mutual authentication
Definition
users being authenticate with the server an vise versa
Term
two common type of virus infections
Definition
New Icons appears spontaneously on the desktop; an install antivirus program is disabled and will not restart
Term
Bitlocker to Go
Definition
used to provide encryption for removable media storage devices
Term
integrity
Definition
refers to preventing data from being tampered with and detecting tempering if occurred
Term
availability
Definition
attempt to make sure that data and servers are available at all times
Term
authentication
Definition
security services that guarantee data origin and validate the identity of users or other persons
Term
confidential
Definition
security service that protect against unauthorized disclosure of data
Term
spoof email
Definition
false sender address
Term
keylogger
Definition
records every user stroke
Term
Trojan Horse
Definition
an application that appears to be one thing but is something else
Term
UAC (user account control)
Definition
Can provide elevation of privileges
Term
in which situation would you typically use a stand alone certificate authority in you public key infrastructure design
Definition
when issuing certificates to users outside of your domain
Term
Tunneling
Definition
encapsulates packets of one protocol inside another protocol
Term
social engineering
Definition
attacks involve user being contacted,either via e-mail,internet, telephone, or in person, and being ask for confidential informational
Supporting users have an ad free experience!