Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
low-end hardware firewall |
|
|
Term
|
Definition
high end hardware firewall |
|
|
Term
|
Definition
|
|
Term
|
Definition
causes potential virus to be isolated |
|
|
Term
|
Definition
uppercase english alphabetic characters
lowercase english alphabrtic characters
numeric digits
Non-alphanumeric characters |
|
|
Term
|
Definition
-is used for the sole purpose of intrusion detection. A honeypot is a system or program that has no real functional value but is only installed or implemented as a means to detect intrusion |
|
|
Term
|
Definition
in active directory are used to control which resources users are allowed to access. This makes managing permissions easier because you can create a security group and then apply permissions only once for the entire group of users |
|
|
Term
|
Definition
|
|
Term
|
Definition
used to allow e-mail messages to be routed to different groups of users |
|
|
Term
|
Definition
Read Only Domain Controller |
|
|
Term
For what purpose would you deploy an RODC |
|
Definition
To restrict domain controller access for physically remote location |
|
|
Term
|
Definition
self replicating and does not require a host program to spread through a network |
|
|
Term
|
Definition
website deployed on your network are part of the this zone, as long as you can access them by URL path |
|
|
Term
|
Definition
includes all web sites that are not part of your network and not assigned to a different zone |
|
|
Term
|
Definition
contains thoses web sites that you have identified as safe |
|
|
Term
|
Definition
|
|
Term
|
Definition
uses digitial signatures to provide security for DNS communications and helps to minimize the likelihood of man-in-the-middle attacks. Also , uses digitial signature to validate the orgin and data integrity for DNS communications |
|
|
Term
|
Definition
configured from software included with the operating system |
|
|
Term
|
Definition
authentication protocol. issues time stamped tickets when authenticating clients |
|
|
Term
NAP
(Network Access Protection) |
|
Definition
used to check the status of a clients windows updates |
|
|
Term
|
Definition
contains a list of emails addresses and domains that the anti spam filter always assume to be spam |
|
|
Term
SSL
(secure socket layer) |
|
Definition
provides security for data that is transmitted over the internet |
|
|
Term
WPA
(WI-FI protected access)
|
|
Definition
provides the highest level of security. Also, provides authentication and for the encryption keys that are used for data encryption |
|
|
Term
|
Definition
used to implement packet filtering of packets sent from and receive on the network |
|
|
Term
WEP
(wireless equivalent Privacy) |
|
Definition
less secure than one that implements WI-FI protected access (WPA or WPA2) |
|
|
Term
what reason is physical security extremely important with laptops and other mobile devices? |
|
Definition
They can be lost or stolen |
|
|
Term
|
Definition
monitoring network communications to collect information about the network and collect the content of network packets |
|
|
Term
what action should you take to keep communication secure |
|
Definition
fiber optic cable to wire unsecured segment |
|
|
Term
|
Definition
the process of making changes to the operating system, network, or applications in order to reduce vulnerability |
|
|
Term
SPF
(sender policy framework)
|
|
Definition
DNS record is used to prevent hackers from using your network's e-mail servers as a platform for send spam with your domain |
|
|
Term
|
Definition
an attempt to get a user to reveal personal or financial information |
|
|
Term
|
Definition
provides more felixibility than software restriction policies, but also allows you to control what software the users are allowed to install and run |
|
|
Term
Software restriction policies |
|
Definition
used to control what software users are allowed to install and run |
|
|
Term
what represents a security threat to your DNS environment |
|
Definition
|
|
Term
which wireless security method uses temporal key integrity (TKIP) encryption |
|
Definition
|
|
Term
how are siftware restricions policies used? |
|
Definition
To control which software a user can execute |
|
|
Term
LL users have been denied all permissions to a file. you need to access the file as quickly as possible. you are logged on as an administrator. what should you do first |
|
Definition
Take owernship of the file |
|
|
Term
VLAN
(virtual local area network) |
|
Definition
treats the included computers as if they are all part of the same subnet |
|
|
Term
SYSKEY improves physical security by requiring a password or special floppy disk to? |
|
Definition
|
|
Term
HRA
(health registration authority) |
|
Definition
responsible for validating and requesting a helth certificate for complaint clients. Also, validents client credentials and send a request for a health certificate to a certificate authority |
|
|
Term
|
Definition
defines how long, in days, that a user is able to use a password. |
|
|
Term
a strong password contains |
|
Definition
Letters,numbers, and special characters |
|
|
Term
You would use a security group to? |
|
Definition
allow only specific users to access specific network resources |
|
|
Term
|
Definition
are typically used as part of a multifactor authentication solution |
|
|
Term
|
Definition
is used to deploy public resources while isolating the internal network |
|
|
Term
you need to implement security measures to provide maxium protection for client computers |
|
Definition
ensure that all computers have the most recent updates |
|
|
Term
what would be the best approach to minimize the likelihood of a client computer being infected with a virus |
|
Definition
restrict the attachment that an email user can receive |
|
|
Term
What would you use to ensure that specific web sites do not have access to user browser patterns |
|
Definition
|
|
Term
what is the primary purpose of a firewall |
|
Definition
to protect the network by restricting incoming and outgoing network traffic |
|
|
Term
you want to ensure that mbile clients receive timely operating system updates. some clients rarely connect to the internal business network. what should you use? |
|
Definition
WUA
(windows update agent) |
|
|
Term
you use microsoft outlook as the email client for your company. you use external email server provide by your internet service provider. you want to pervent virus infection on computers in your active directory? |
|
Definition
Install a antivirus program on each client computer |
|
|
Term
to deploy network access protection (NAP), you must have? |
|
Definition
A NAP health policy server |
|
|
Term
what will happen when you move a file you encrypted through the encrypting file system (EFS) to an unencrypted folder on an NTFS parition? |
|
Definition
The file remains encrypted |
|
|
Term
what would reduce the likelihood hood of a sniffer attack? |
|
Definition
encrypting data transmitted over the network |
|
|
Term
typically used as part as a multifactor authentication solution |
|
Definition
|
|
Term
you need to secure your wireless network, which provides highest level of security |
|
Definition
|
|
Term
using trusted platform module(TPM)ensures |
|
Definition
hardware encryption of data |
|
|
Term
example of least privilege |
|
Definition
logging on as a limited user instead of an administrator to run apllications |
|
|
Term
example of biometric security |
|
Definition
|
|
Term
when should you use Group policy editor |
|
Definition
when establishing audit policy that should be applied across the domain |
|
|
Term
which two permissions are consider basic NTFS file permissions |
|
Definition
|
|
Term
|
Definition
a self-replicating computer virus |
|
|
Term
|
Definition
authentication protocol is used for interactive logon,including smart card logon, or current windows versions |
|
|
Term
how to minimize the attack surface for your network |
|
Definition
ensuring that only require features are enabled |
|
|
Term
to ensure that user cannot connect to a rouge wireless access point, you should? |
|
Definition
install a wireless intrusion prevention system |
|
|
Term
you want to prevent users who are running windows vista and windows 7 on your corporate network from copying sensitive data to removable devices |
|
Definition
define a group policy to control wire access to removable media |
|
|
Term
Microsoft Baseline security analyzer |
|
Definition
a tool on a server or on clients to ensure that all security updates have been applied and identify potential security issues |
|
|
Term
|
Definition
monitoring network communications to collect information about the network and collect the content of the network packet |
|
|
Term
|
Definition
a third system monitors communication between a client and a server until it can take over one end of the communication session |
|
|
Term
|
Definition
|
|
Term
|
Definition
active process of trying overload a network or a server with traffic |
|
|
Term
|
Definition
users being authenticate with the server an vise versa |
|
|
Term
two common type of virus infections |
|
Definition
New Icons appears spontaneously on the desktop; an install antivirus program is disabled and will not restart |
|
|
Term
|
Definition
used to provide encryption for removable media storage devices |
|
|
Term
|
Definition
refers to preventing data from being tampered with and detecting tempering if occurred |
|
|
Term
|
Definition
attempt to make sure that data and servers are available at all times |
|
|
Term
|
Definition
security services that guarantee data origin and validate the identity of users or other persons |
|
|
Term
|
Definition
security service that protect against unauthorized disclosure of data |
|
|
Term
|
Definition
|
|
Term
|
Definition
records every user stroke |
|
|
Term
|
Definition
an application that appears to be one thing but is something else |
|
|
Term
UAC (user account control) |
|
Definition
Can provide elevation of privileges |
|
|
Term
in which situation would you typically use a stand alone certificate authority in you public key infrastructure design |
|
Definition
when issuing certificates to users outside of your domain |
|
|
Term
|
Definition
encapsulates packets of one protocol inside another protocol |
|
|
Term
|
Definition
attacks involve user being contacted,either via e-mail,internet, telephone, or in person, and being ask for confidential informational |
|
|