How can we help?

You can also find more resources in our Help Center.

Study sets matching "final exam study guide + network security"

Study sets
Classes
Users

Study sets matching "final exam study guide + network security"

76 terms
Study Guide Security + Guide to Network Security Fundamentals
In a ______ test, the tester has no pr…
The most common type of authentication…
(Metadata) is data about data
A RADIUS ________ is a computer that f…
Black box
(password)
...
(Proxy)
In a ______ test, the tester has no pr…
Black box
The most common type of authentication…
(password)
76 terms
Study Guide Security + Guide to Network Security Fundamentals
In a ______ test, the tester has no pr…
The most common type of authentication…
(Metadata) is data about data
A RADIUS ________ is a computer that f…
Black box
(password)
...
(Proxy)
In a ______ test, the tester has no pr…
Black box
The most common type of authentication…
(password)
44 terms
Security+ Guide To Network Security Fundamentals Ch 1
Acceptance
Accounting
Advanced Persistent Threat (APT)
Asset
Acknowledging a risk but taking no action to address it.
The ability that provides tracking of events.
Multiyear intrusion campaign that targets highly sensitive ec…
An item that has value.
Acceptance
Acknowledging a risk but taking no action to address it.
Accounting
The ability that provides tracking of events.
57 terms
Security + Guide to Network Security Fundamentals
What are the 5 Authentication Factors
What is Authentication
This is used to initially identify you…
This is a secret combination of letter…
Somewhere you are, Something you have, Something you are, Som…
proof of genuiness
username
password
What are the 5 Authentication Factors
Somewhere you are, Something you have, Something you are, Som…
What is Authentication
proof of genuiness
31 terms
Security+ Guide to Network Security Fundamentals - Chapter 15
architectural design
attack surface
banner grabbing
baseline reporting
The process of defining a collection of hardware and software…
The code that can be executed by unauthorized users in a soft…
Gathering information from messages that a service transmits…
A comparison of the present state of a system compared to its…
architectural design
The process of defining a collection of hardware and software…
attack surface
The code that can be executed by unauthorized users in a soft…
31 terms
Security + Guide to Network Security Fundamentals Ch. 13
Business Continuity
Succession Planning
Business Impact Analysis
Disaster Planning
An organization's ability to maintain its operations after a…
The process of determining in advance who is authorized to ta…
The process of analyzing most important business functions an…
Also known as Contingency Planning. It is a subset of busines…
Business Continuity
An organization's ability to maintain its operations after a…
Succession Planning
The process of determining in advance who is authorized to ta…
20 terms
Security+guide to network
A statement regarding due diligence wo…
Which risk category addresses events t…
_____ management covers the procedures…
Which of the following is not a charac…
A. Disposal and destruction policy... B. Acceptable use policy... C…
A. Strategic... B. Operational... C. Tactical... D. Daily
A. Privilege ... B. Threat ... C. Task ... D. Asset
A. Policies communicate a unanimous agreement of judgment.... B.…
A statement regarding due diligence wo…
A. Disposal and destruction policy... B. Acceptable use policy... C…
Which risk category addresses events t…
A. Strategic... B. Operational... C. Tactical... D. Daily
57 terms
Security + Guide to Network Security Fundamentals Final
threat agent
Gramm-Leach-Bliley Act
hactivist
cyberterrorism
A person or element that has the power to carry out a threat.
The ____ requires all financial service institutions to commu…
have philosophical and political reasons for breaking into sy…
A premeditated, politically motivated attack against informat…
threat agent
A person or element that has the power to carry out a threat.
Gramm-Leach-Bliley Act
The ____ requires all financial service institutions to commu…
44 terms
Security+ Guide to Network Security Fundamentals - Chapter 3
ActiveX
ActiveX control
add-on
Address Resolution Protocol (ARP)
A set of rules for how applications under the Microsoft Windo…
A specific way of implementing ActiveX that runs through the…
Program that provides additional functionality to Web browsers.
Part of the TCP/IP protocol for determining the MAC address b…
ActiveX
A set of rules for how applications under the Microsoft Windo…
ActiveX control
A specific way of implementing ActiveX that runs through the…
22 terms
Security + Guide to Network Security Fundamentals Ch. 10
Password
Social engineering
Phishing
Capturing
The most common type of authentication today.
A type of attack on passwords which may include phishing, sho…
A type of social engineering that involves sending an email,…
A type of attack on passwords that uses keylogger or protocol…
Password
The most common type of authentication today.
Social engineering
A type of attack on passwords which may include phishing, sho…
38 terms
Security+ Guide to Network Security Fundamentals - Chapter 2
adware
armored virus
backdoor
bot herder
A software program that delivers advertising content in a man…
A virus that goes to great lengths in order to avoid detection
Software code that gives access to a program or a service tha…
An attacker who controls a botnet.
adware
A software program that delivers advertising content in a man…
armored virus
A virus that goes to great lengths in order to avoid detection
28 terms
Security + Guide to Network Security Fundamentals Ch. 11
Cryptography
Cleartext
Plaintext
Key
The process of scrambling information into a secure form so t…
Data stored or transmitted without encryption. Also known as…
Data to be encrypted, input into an encryption algorithm.
A mathematical value entered into an algorithm to produce cip…
Cryptography
The process of scrambling information into a secure form so t…
Cleartext
Data stored or transmitted without encryption. Also known as…
49 terms
Security+ Guide To Network Security Fundamentals Ch 1
Acceptance
Accounting
Advanced Persistent Threat (APT)
Asset
Acknowledging a risk but taking no action to address it.
The ability that provides tracking of events.
Multiyear intrusion campaign that targets highly sensitive ec…
An item that has value.
Acceptance
Acknowledging a risk but taking no action to address it.
Accounting
The ability that provides tracking of events.
38 terms
Security + Guide to Network Security Fundamentals -- Application and Network Attacks
Add-ons
Address Resolution Protocol (ARP)
ARP poisoning
Attachments
Programs that provide additional functionality to Web browsers.
Part of the TCP/IP protocol for determining the MAC address b…
An attack that corrupts the ARP cache.
Files that are coupled to e-mail messages.
Add-ons
Programs that provide additional functionality to Web browsers.
Address Resolution Protocol (ARP)
Part of the TCP/IP protocol for determining the MAC address b…
100 terms
Networking Security II Test 2 Study Guide
The primary reason for classifying dis…
For the purpose of business continuity…
The primary impact of a pandemic on an…
The activity that is concerned with th…
c. To classify different types of events to better understand…
a. Any event that impairs the ability of an organization to c…
d. Long periods of employee absenteeism that impact the... organ…
c. Business Continuity Planning
The primary reason for classifying dis…
c. To classify different types of events to better understand…
For the purpose of business continuity…
a. Any event that impairs the ability of an organization to c…
13 terms
Security+ Guide to Network Security Fundamentals - Chapter 13
business continuity
business continuity planning and testing
business impact analysis (BIA)
chain of custody
The ability of an organization to maintain its operations and…
The process of identifying exposure to threats, creating prev…
An analysis of the most important mission-critical business f…
A process of documentation that shows that the evidence was u…
business continuity
The ability of an organization to maintain its operations and…
business continuity planning and testing
The process of identifying exposure to threats, creating prev…
38 terms
Security+ Guide to Network Security Fundamentals - Chapter 1
acceptance
accounting
Advanced Persistent Threat (APT)
asse
Acknowledging a risk but taking no action to address it.
The ability that provides tracking of events.
Multiyear intrusion campaign that targets highly sensitive ec…
t An item that has value.
acceptance
Acknowledging a risk but taking no action to address it.
accounting
The ability that provides tracking of events.
35 terms
Security+ Guide To Network Security Fundamentals Ch 2
Adware
Armored Virus
Backdoor
Bot Herder
A software program that delivers advertising content in a man…
A virus that goes to great lengths in order to avoid detection.
Software code that gives access to a program or a service tha…
An attacker who controls a botnet.
Adware
A software program that delivers advertising content in a man…
Armored Virus
A virus that goes to great lengths in order to avoid detection.
31 terms
Security+ Guide to Network Security Fundamentals |Chapter 13
(Pg. 489) Business Continuity
(Pg. 489) Business continuity planning…
(Pg. 489) Succession planning
(Pg. 489) BIA
The ability of an organization to maintain its operations and…
In short, ____________________ is designed to ensure that an…
Determining in advance who will be authorized to take over in…
A _____ typically begins by identifying threats through a ris…
(Pg. 489) Business Continuity
The ability of an organization to maintain its operations and…
(Pg. 489) Business continuity planning…
In short, ____________________ is designed to ensure that an…
28 terms
Security + Guide to Network Security Fundamentals Ch. 11
Cryptography
Cleartext
Plaintext
Key
The process of scrambling information into a secure form so t…
Data stored or transmitted without encryption. Also known as…
Data to be encrypted, input into an encryption algorithm.
A mathematical value entered into an algorithm to produce cip…
Cryptography
The process of scrambling information into a secure form so t…
Cleartext
Data stored or transmitted without encryption. Also known as…
28 terms
Security + Guide to Network Security Fundamentals Ch. 14
Acceptable Use Policy (AUP)
Vulnerability Assessment steps
Annualized Loss Expectancy (ALE)
Annualized Rate of Occurrence (ARO)
A policy that defines the actions users may perform while acc…
Asset Identification... Threat identification... Vulnerability Appr…
The expected monetary loss that can be anticipated for an ass…
The likelihood of a risk occurring within a year
Acceptable Use Policy (AUP)
A policy that defines the actions users may perform while acc…
Vulnerability Assessment steps
Asset Identification... Threat identification... Vulnerability Appr…
32 terms
Security + Guide to Network Security Fundamentals Ch. 15
architectural design
attack surface
banner grabbing
baseline reporting
the process of defining a collection of hardware and software…
the code that can be executed by unauthorized users in a soft…
Gathering info from messages that a service transmits when an…
a comparison of the present state of a system compared to its…
architectural design
the process of defining a collection of hardware and software…
attack surface
the code that can be executed by unauthorized users in a soft…
33 terms
Security + Guide to Network Security Fundamentals Ch. 12
Digital certificate
Certificate Authority (CA)
Registration Authority (RA)
Certificate revocation list (CRL)
It contains a digital signature which ties an individual's id…
A trusted third party responsible for issuing digital certifi…
A subordinate entity designed to handle specific CA tasks. It…
It lists digital certificates that have been revoked.
Digital certificate
It contains a digital signature which ties an individual's id…
Certificate Authority (CA)
A trusted third party responsible for issuing digital certifi…
22 terms
Security + Guide to Network Security Fundamentals Ch. 10
Password
Social engineering
Phishing
Capturing
The most common type of authentication today.
A type of attack on passwords which may include phishing, sho…
A type of social engineering that involves sending an email,…
A type of attack on passwords that uses keylogger or protocol…
Password
The most common type of authentication today.
Social engineering
A type of attack on passwords which may include phishing, sho…
21 terms
Chapter 9 Security + Guide to Network Security Fundamentals
The mechanism used in an information s…
A set of permissions that are attached…
A standard that provides a predefined…
The process of setting a user's accoun…
access control
access control list (ACL)
access control model
account expiration
The mechanism used in an information s…
access control
A set of permissions that are attached…
access control list (ACL)
20 terms
Security+ Guide to Network Security fundamentals 5th Edition Ch5
1. The Hashed Message Authentication C…
What is the latest version of the Secu…
3. All of the following can be broken…
4. Elliptic Curve Diffie—Hellman (ECDH…
encrypts the key and the message
SHA-3
OTP
in-band key exchange
1. The Hashed Message Authentication C…
encrypts the key and the message
What is the latest version of the Secu…
SHA-3
35 terms
Security+ Guide To Network Security Fundamentals Ch 2
Adware
Armored Virus
Backdoor
Bot Herder
A software program that delivers advertising content in a man…
A virus that goes to great lengths in order to avoid detection.
Software code that gives access to a program or a service tha…
An attacker who controls a botnet.
Adware
A software program that delivers advertising content in a man…
Armored Virus
A virus that goes to great lengths in order to avoid detection.
45 terms
Security + Guide to Network Security Fundamentals Ch. 13
Business Continuity
Succession Planning
Business Impact Analysis
Disaster Planning
An organization's ability to maintain its operations after a…
The process of determining in advance who is authorized to ta…
The process of analyzing most important business functions an…
Also known as Contingency Planning. It is a subset of busines…
Business Continuity
An organization's ability to maintain its operations after a…
Succession Planning
The process of determining in advance who is authorized to ta…
32 terms
Guide to Network Security Fundamentals CH5
access list
access log
anti-spyware
anti-virus
A record or list of individuals which have permission to ente…
A log that can provide details regarding requests for specifi…
Software that helps prevent computers from becoming infected…
Software that can examine a computer for any infections as we…
access list
A record or list of individuals which have permission to ente…
access log
A log that can provide details regarding requests for specifi…
20 terms
Security+ Guide to Network Security fundamentals 5th Edition Ch3
Which of these is NOT a reason why sec…
Which of these is not an HTTP header a…
What is another name for a locally sha…
Browser plug-ins
The processors on clients are smaller than on web servers and…
Content-length
Flash cookie
only function on web servers can be embedded inside a webpage…
Which of these is NOT a reason why sec…
The processors on clients are smaller than on web servers and…
Which of these is not an HTTP header a…
Content-length
20 terms
Security+ Guide to Network Security fundamentals 5th Edition Ch1
Which of the following is NOT a charac…
Which of the following was used to des…
Which of the following is NOT a reason…
Why can brokers command such a high pr…
Is only used by hactivist against foreign enemies
Grey Hat hackers
Simplicity of attack tools
The vulnerability was previously unknown and is likely to be…
Which of the following is NOT a charac…
Is only used by hactivist against foreign enemies
Which of the following was used to des…
Grey Hat hackers
49 terms
Security+ Guide To Network Security Fundamentals Ch 1
Acceptance
Accounting
Advanced Persistent Threat (APT)
Asset
Acknowledging a risk but taking no action to address it.
The ability that provides tracking of events.
Multiyear intrusion campaign that targets highly sensitive ec…
An item that has value.
Acceptance
Acknowledging a risk but taking no action to address it.
Accounting
The ability that provides tracking of events.
20 terms
Security+ Guide to Network Security fundamentals 5th Edition Ch2
A (n) _____ requires a user to transpo…
Which of these is NOT an action that a…
Which malware locks up the user's comp…
Which of the following is an attempt t…
virus
transport itself through the network to another device
Ransomeware
Intimidation
A (n) _____ requires a user to transpo…
virus
Which of these is NOT an action that a…
transport itself through the network to another device
20 terms
Security+ Guide to Network Security fundamentals 5th Edition Ch4
1. What type of controls are the proce…
2. Which of the following is NOT an ac…
3. Which of the following is NOT desig…
4. Which of the€ following is NOT a mo…
administrative controls
resource control
barricade
moisture
1. What type of controls are the proce…
administrative controls
2. Which of the following is NOT an ac…
resource control
44 terms
Security+ Guide to Network Security Fundamentals, 5th Ed., Ch. 8
access log
audit log
cloud computing
cloud storage
A log that can provide details regarding requests for specifi…
A log that is used to record which user performed an action a…
A pay-per-use computing model in which customers pay only for…
A cloud system that has no computational capabilities but pro…
access log
A log that can provide details regarding requests for specifi…
audit log
A log that is used to record which user performed an action a…
100 terms
Security+ Guide to Network Security Fundamentals Ch 1-8
Which of the following is not a charac…
Which of the following was used to des…
Which the following is NOT a reason wh…
Why can brokers command such a high pr…
Is used only by hactivists against foreign enemies
Gray hat hacker
greater sophistication of defense tools
The vulnerability was previously unknown and is unlikely to b…
Which of the following is not a charac…
Is used only by hactivists against foreign enemies
Which of the following was used to des…
Gray hat hacker
23 terms
Security+ guide to network security fundamentals chapter 6, 5th ed.
Bridge Trust Model
Certificate Authority (CA)
Certificate Repository (CR)
Certificate Revocation List (CRL)
A trust model with one CA that acts as a facilitator to inter…
A trusted third-party agency that is responsible for issuing…
A publicly accessible centralized directory of digital certif…
A repository that lists revoked digital certificates
Bridge Trust Model
A trust model with one CA that acts as a facilitator to inter…
Certificate Authority (CA)
A trusted third-party agency that is responsible for issuing…
100 terms
Security+ Guide to Network Security Fundamentals Ch 1-8
Which of the following is not a charac…
Which of the following was used to des…
Which the following is NOT a reason wh…
Why can brokers command such a high pr…
Is used only by hactivists against foreign enemies
Gray hat hacker
greater sophistication of defense tools
The vulnerability was previously unknown and is unlikely to b…
Which of the following is not a charac…
Is used only by hactivists against foreign enemies
Which of the following was used to des…
Gray hat hacker
44 terms
CompTIA Security+ Guide to Network Security Fundamentals (5th) - Chapter 01
Chief Information Security Officer
Security Manager
Security Administrator
Security Technician
This person reports directly to the chief information officer…
This person reports to the CISO and supervises technicians, a…
This person has both technical and managerial skills. He/she…
This person is generally an entry-level position. He/she prov…
Chief Information Security Officer
This person reports directly to the chief information officer…
Security Manager
This person reports to the CISO and supervises technicians, a…
23 terms
Security+ Guide to Network Security Fundamentals, 5th Ed., Chapter 6
bridge trust model
Certificate Authority (CA)
Certificate Repository (CR)
Certificate Revocation List (CRL)
A trust model with one CA that acts as a facilitator to inter…
A trusted third-party agency that is responsible for issuing…
A publicly accessible centralized directory of digital certif…
A repository that lists revoked digital certificates.
bridge trust model
A trust model with one CA that acts as a facilitator to inter…
Certificate Authority (CA)
A trusted third-party agency that is responsible for issuing…
CompTIA Security+ Guide to Network Security Fundementals Ch. 1 review
Which of the following in NOT a charac…
Which of the following was used to des…
Which of the following is NOT a reason…
Why can brokers command such a high pr…
d. is only used by hactivists against foreign enemies
d. gray hat hackers
c. greater sophistication of defense tools
c. the vulnerability was previously unknown and is unlikely t…
Which of the following in NOT a charac…
d. is only used by hactivists against foreign enemies
Which of the following was used to des…
d. gray hat hackers
49 terms
Guide to Network Security CHP 1
Network Security
Physical Security
Personal Security
Operations Security
The protection of networking components, connections, and con…
The protection of the physical items or areas of an organizat…
The protection of people who are authorized to access the org…
The protection of the details of a particular operations or s…
Network Security
The protection of networking components, connections, and con…
Physical Security
The protection of the physical items or areas of an organizat…
35 terms
Security+ Guide to Network Security Fundamentals, 5th Ed., Ch. 7
anomaly-based monitoring
application-aware firewall
application-aware IDS
application-aware IPS
A monitoring technique used by an intrusion detection system…
A firewall that can identify the applications that send packe…
A specialized intrusion detection system (IDS) that is capabl…
An intrusion prevention system (IPS) that knows information s…
anomaly-based monitoring
A monitoring technique used by an intrusion detection system…
application-aware firewall
A firewall that can identify the applications that send packe…
519 terms
MEGA SET Security+ Guide to Network Security Fundamentals
Advanced Encryption Standard (AES)
algorithm
asymmetrical cryptographic algorithm
block cipher
A symmetric cipher that was approved by the NIST in late 2000…
Procedures based on a mathematical formula used to encrypt an…
Cryptography that uses two mathematically related keys.
A cipher that manipulates an entire block of plain text at on…
Advanced Encryption Standard (AES)
A symmetric cipher that was approved by the NIST in late 2000…
algorithm
Procedures based on a mathematical formula used to encrypt an…
21 terms
Chapter 8 Security + Guide to Network security fundamentals
The encryption protocol standard for W…
An attack that sends unsolicited messa…
An attack that accesses unauthorized i…
A wireless technology that uses short-…
AES-CCMP
Bluejacking
Bluesnarfing
Bluetooth
The encryption protocol standard for W…
AES-CCMP
An attack that sends unsolicited messa…
Bluejacking
50 terms
SECURITY + Guide to Network Security Fundamentals (v4)
Accounting
Asset
Authorization
Authentication
The ability that provides tracking of events.
An Item that has value.
The act of ensuring that an individual or element is genuine.
The steps that ensure that the individual is who they claim t…
Accounting
The ability that provides tracking of events.
Asset
An Item that has value.
236 terms
Security+ Guide to Network Security Fundamentals Ch 1-14
A study by Foote Partners showed that…
An information security ____ position…
In information security, a loss can be…
Targeted attacks against financial net…
10 to 14
manager
theft of information, a delay in transmitting information tha…
cybercrime
A study by Foote Partners showed that…
10 to 14
An information security ____ position…
manager
41 terms
Security + Guide to Network Fundamentals - Chapter 8
AES-CCMP (Advanced Encryption Standard…
Bluejacking
Bluesnarfing
Bluetooth
The encryption protocol standard for Wi-Fi Protected Access 2…
An attack that sends unsolicited messages to Bluetooth-enable…
An attack that accesses unauthorized information from a wirel…
A wireless technology that uses short-range Radio Frequency (…
AES-CCMP (Advanced Encryption Standard…
The encryption protocol standard for Wi-Fi Protected Access 2…
Bluejacking
An attack that sends unsolicited messages to Bluetooth-enable…
9 terms
CTEC 335 - Guide to Network Security
Network Security
Physical Security
Personal Security
Operations Security
The protection of networking components, connections, and con…
The protection of the items or areas of an organization from…
The protection of those who are authorized to access the orga…
The protection of the details of a particular activitie or se…
Network Security
The protection of networking components, connections, and con…
Physical Security
The protection of the items or areas of an organization from…
42 terms
Security+ Guide to Network Fundamentals Final
If a software application aborts and l…
Which Statement is not a general secur…
When an unauthorized even occurs, what…
Which one-time password is event driven?
Fail-open
Only access a social networking site on personal time
To secure the crime scene
HOTP
If a software application aborts and l…
Fail-open
Which Statement is not a general secur…
Only access a social networking site on personal time
1 of 10