Shared Flashcard Set

Details

Security + || Additional Notes
Security + || Additional Notes
26
Computer Science
Undergraduate 4
12/13/2018

Additional Computer Science Flashcards

 


 

Cards

Term
Invasive Scan
Definition
Vulnerability scan that could potentially harm a system.
Term
Recon Scan
Definition
Vulnerability scan that is non-invasive.
Term
Discovery Scan
Definition
Vulnerability scan gives you an idea of your topology.
Term
What can you do with a Discovery Scan?
Definition
You can discover what active IPs are on the network and an IP list to use as a pivot point.
Term
Credential Scan
Definition
A vulnerability scan that is searching for something specific.
Term
How To Secure A Data Center Server
Definition
Cable Locks

Antivirus

Host Based firewall

Proximity Reader

Sniffer

Mantrap
Term
How To Secure A Corporate Phone
Definition
Sceen Lock

Strong Password

Device Encrypt

Remote Wipe

GPS Tracker

Pop up blocker
Term
Proximity badge should be used to secure what?
Definition
Data Centers and Offices
Term
Laptops are secured by Cable Locks, but employee laptops are secured by what?
Definition
Biometric Readers
Term
Key boxes should be secured in what?
Definition
Safe
Term
Captive Portal
Definition
Forcing an agreement or log-in for internet access.
Term
Split Tunnel
Definition
Uses native IP for use of both networks.
Term
Port 110
Definition
Pop 3
Term
Port 25
Definition
SMTP
Term
Port 21
Definition
FTP
Term
Port 22
Definition
SCP
Term
FTPS uses SSL over port 443, while SFTP is using what over what?
Definition
SSH
Port 22
Term
Port 443
Definition
HTTPS
Term
Port 80
Definition
HTTP
Term
Port 23
Definition
Telnet
Term
SMIME does what?
Definition
Encrypt Email
Term
VOIP
Definition
Voice Over IP
Term
Segmentation
Definition
Separating different things to their own networks.
Term
Federation
Definition
Parent/Child Trust

One way or Two way
Term
Air Gap
Definition
Closed Restricted Network
Term
Fingerprinting
Definition
Snatching router information
Supporting users have an ad free experience!