What can be done to prevent remote people from running programs on your
computer? - ANSWERS-- Turn on a firewall
- Use strong passwords on all user accounts
network address translation (NAT) - ANSWERS-The process of changing an IP
address while it is in transit across a router. This is usually so one larger address
space (private) can be remapped to another address space, or single IP address
(public).
- An internet standard which connects the internet to a private network while
maintaining privacy.
- This is used to translate one IP addressing system with another that is not
necessarily compatible.
Terminal Access Controller Access-Control System (TACACS) - ANSWERS-A remote
authentication protocol similar to RADIUS used more often in UNIX networks.
circuit-level gateway - ANSWERS-Works at the Session Layer of the OSI model and
applies security mechanisms when a TCP or UDP connection is established; they
act as a go-between for the Transport and Application Layers in TCP/IP.
Write head - ANSWERS-Used to write data to magnetic storage
,Which of the following is provided by a graphical interface that isn't normally
provided to a non graphical interface? - ANSWERS-- Windows
- Menus
- Popups
- Desktop
network intrusion prevention system (NIPS) - ANSWERS-Designed to inspect
traffic, and based on its configuration or security policy, the system can remove,
detain, or redirect malicious traffic.
Bandwidth - ANSWERS-The amount of data that can be transmitted over a
network in a given amount of time.
Packet Fields - ANSWERS-At each layer there is the header field; used for
transmission within that layer
And a payload field; used within the above layers
content filters - ANSWERS-Individual computer programs that block external files
that use JavaScript or images from loading into the browser.
features, such as encryption. However, it can still be used for a secure VPN
connection if it is combined with another protocol that provides encryption.
,Attack - ANSWERS-Intentional act of attempting to bypass one or more computer
security controls.
IDS (Intrusion Detection System) - ANSWERS-passively monitors the traffic on a
network. can recognize the signature of a well-known attack and respond to stop
the attack. However, this sensor does not reside in-line with the traffic flow.
Therefore, one or more malicious packets might reach an intended victim before
the traffic flow is stopped by this sensor.
Read head - ANSWERS-Used to read data on magnetic storage
Tickets - ANSWERS-Part of the authentication process used by Kerberos.
symmetric encryption - ANSWERS-both the sender and receiver of a packet use
the same key (a shared key ) for encryption and decryption.
Security Plan - ANSWERS-Document that details the security controls established
and planned for a particular system.
Cloud storage - ANSWERS-third party storage of data- using someone else's
servers.
, SNMP agent - ANSWERS-Software deployed by the network management system
that is loaded on managed devices. The software redirects the information that
the NMS needs to monitor the remote managed devices.
Tier-1 ISP - ANSWERS-Are national ISPs that connect together and exchange data
at NAPs.
Transport Layer Security (TLS) - ANSWERS-The successor to SSL. Provides secure
Internet communications. This is shown in a browser as HTTPS.
Network Management System (NMS) - ANSWERS-The software run on one or
more servers that controls the monitoring of network attached devices and
computers.
Hashing algorithm - ANSWERS-a tool that ensures data integrity by taking binary
data and producing a fixed-length representation called the hash value or
message digest
backbone - ANSWERS-The part of a network to which segments and significant
shared devices (such as routers, switches, and servers) connect.
The implementation of an IA operational baseline will be an incremental process
of doing what? - ANSWERS-Protecting critical assets
One of the jobs of the kernel is to: - ANSWERS-- Manage the system's resources
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Teacher101. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $17.99. You're not tied to anything after your purchase.