100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
SANS Cyber Security Questions And Answers With Latest Updates $13.49   Add to cart

Exam (elaborations)

SANS Cyber Security Questions And Answers With Latest Updates

 2 views  0 purchase
  • Course
  • SANS Cyber Security
  • Institution
  • SANS Cyber Security

SANS Cyber Security Questions And Answers With Latest Updates Ensures that resources are only granted to those users who are entitled to them. ANS Access Control A mechanism that implements access control for a system resource by listing the identities of the system entities that are permitted...

[Show more]

Preview 3 out of 22  pages

  • November 7, 2024
  • 22
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • sans cyber security
  • SANS Cyber Security
  • SANS Cyber Security
avatar-seller
Labtech
SANS Cyber Security Questions And Answers With
Latest Updates
Ensures that resources are only granted to those users who are entitled to them. ANS Access
Control


A mechanism that implements access control for a system resource by listing the identities of the
system entities that are permitted to access the resource. (or referred to as ACL) ANS Access
Control List


A security service that provides protection of system resources against unauthorized access. The two
basic mechanisms for implementing this service are ACLs and tickets. ANS Access Control
Service


The maintenance of access information which consists of four tasks: account administration,
maintenance, monitoring, and revocation. ANS Access Management Access


Uses rows to represent subjects and columns to represent objects with privileges listed in each cell.
ANS Access Matrix



The process of collecting all the legitimate account names on a system. ANS Account Harvesting



The practice of sending an ACK inside another packet going to the same destination. ANS ACK
Piggybacking


Program code embedded in the contents of a web page. When the page is accessed by a web browser,
the embedded code is automatically downloaded and executed on the user's workstation. Ex. Java,
ActiveX (MS) ANS Active Content


Aim to prevent virus infection by monitoring for malicious activity on a system, and blocking that
activity when possible. ANS Activity Monitors

,A protocol for mapping an Internet Protocol address to a physical machine address that is recognized
in the local network. A table, usually called the ARP cache, is used to maintain a correlation between
each MAC address and its corresponding IP address. ARP provides the protocol rules for making this
correlation and providing address conversion in both directions. (ARP) ANS Address Resolution
Protocol


An encryption standard being developed by NIST. Intended to specify an unclassified, publicly-
disclosed, symmetric encryption algorithm. ANS Advanced Encryption Standards


A finite set of step-by-step instructions for a problem-solving or computation procedure, especially
one that can be implemented by a computer. ANS Algorithm


Java programs; an application program that uses the client's web browser to provide a user interface.
ANS Applet


A pioneer packet-switched network that was built in the early 1970s under contract to the US
Government, led to the development of today's Internet, and was decommissioned in June 1990.
(ARPANET) ANS Advanced Research Projects Agency Network


Public-key cryptography; A modern branch of cryptography in which the algorithms employ a pair of
keys (a public key and a private key) and use a different component of the pair for different steps of
the algorithm. ANS Asymmetric Cryptography



The fact that a small investment, properly leveraged, can yield incredible results. ANS
Asymmetric Warfare


The information gathering and analysis of assets to ensure such things as policy compliance and
security from vulnerabilities. ANS Auditing



The process of confirming the correctness of the claimed identity. ANS Authentication



The validity and conformance of the original information. ANS Authenticity

, The approval, permission, or empowerment for someone or something to do something. ANS
Authorization


One network or series of networks that are all under one administrative control; sometimes referred
to as a routing domain; assigned a globally unique number. (ASN) ANS Autonomous System


The need to ensure that the business purpose of the system can be met and that it is accessible to
those who need to use it. ANS Availability


A tool installed after a compromise to give an attacker easier access to the compromised system
around any security mechanisms that are in place. ANS Backdoor


Commonly used to mean the capacity of a communication channel to pass data through the channel
in a given amount of time. Usually expressed in bits per second ANS Bandwidth


The information that is displayed to a remote user trying to connect to a service. This may include
version information, system information, or a warning about authorized use. ANS Banner


The simplest web-based authentication scheme that works by sending the username and password
with each request. ANS Basic Authentication



Has been hardened in anticipation of vulnerabilities that have not been discovered yet. ANS
Bastion Host



An implementation of DNS. DNS is used for domain name to IP address resolution. (BIND)
ANS Berkeley Internet Name Domain



Uses physical characteristics of the users to determine access. ANS Biometrics


The smallest unit of information storage; a contraction of the term "binary digit;" one of two
symbolsÑ"0" (zero) and "1" (one) - that are used to represent binary numbers. ANS Bit

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Labtech. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $13.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

67866 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$13.49
  • (0)
  Add to cart