100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
C836 EXAM AND REVIEW UPDATED 2022 $17.99   Add to cart

Exam (elaborations)

C836 EXAM AND REVIEW UPDATED 2022

1 review
 6 views  0 purchase
  • Course
  • Institution
  • Book

C836 EXAM AND REVIEW UPDATED 2022

Preview 2 out of 9  pages

  • October 19, 2024
  • 9
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers

1  review

review-writer-avatar

By: tutorsection1 • 1 week ago

avatar-seller
C836 EXAM AND REVIEW UPDATED 2022/2023 CHAPTER 1 TO
chapter 6
first and most important step of operational security - ANSWER: identify our most
critical information assets

threat - ANSWER: something that has the potential to cause harm to us

vulnerabilities - ANSWER: weaknesses that can be used to harm us

ex: security controls not very rigorous that can allow one to easily change source
code

risk occurs when.. - ANSWER: when we have a matching threat and vulnerability

deterrent controls - ANSWER: designed to discourage those who might seek to
violate our security controls from doing so

deterrent examples - ANSWER: signs in public spaces that might indicate that video
monitoring is in place, violations for breaking the law..

detective - ANSWER: serve to detect and report undesirable events taking place

detective example - ANSWER: burglar alarms and physical intrusion detection
systems

preventive controls - ANSWER: used to physically prevent unauthorized entities from
breaching our physical security

physical security example - ANSWER: simple mechanical lock or high fences

(RAID) redundant arrays of inexpensive disks - ANSWER: used to ensure we do

Magnetic Media - ANSWER: Hard drives, floppy drives and tape drives

sensitive to magnetic fields

flash media - ANSWER: sturdy and resilient

optical media - ANSWER: CDs and DVDs

sensitive to temperature and even scratching that can render media unusable

physical controls - ANSWER: locks, fences, cameras, security guards, lighting

, more complex security measures, such as the use of iris scanners, mantraps, and
identification badges

administrative controls - ANSWER: background checks, periodic drug tests

main method of ensuring availability - ANSWER: backups like RAIDs

subnet - ANSWER: small network divided from a larger network

firewall - ANSWER: a mechanism for maintaining control over the traffic that flows
into and out of our network

packet filtering - ANSWER: looks at the contents of each packet in the traffic
individually and makes a gross determination, based on the source and destination
IP addresses, the port number, and the protocol being used, of whether the traffic
will be allowed to pass.

Since each packet is examined individually and not in concert with the rest of the
packets comprising the content of the traffic, it can be possible to slip attacks
through this type of firewall.

stateful packet inspection - ANSWER: like packet filtering but able to keep track of
traffic on a granular level

will only allow traffic through that is part of a new or already established connection

knows when the connection has been closed and further traffic should not
legitimately be present

deep packet inspection - ANSWER: capable of analyzing the actual content of the
traffic that is flowing through them

proxy servers - ANSWER: serve as a choke point in order to allow us to filter traffic
for attacks or undesirable content such as malware or traffic to Web sites hosting
adult content

DMZ (demilitarized zone) - ANSWER: layer of protection between the device, such as
our mail server, and the Internet, and between the rest of our network and the
device

Signature based IDses - ANSWER: They maintain a database of the signatures that
might signal a particular type of attack and compare incoming traffic to those
signatures

works well, except when we encounter an attack that is new, or has been specifically
constructed in order to not match existing attack signatures

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller jrein8742. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $17.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

79373 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$17.99
  • (1)
  Add to cart