100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4.2 TrustPilot
logo-home
Tentamen (uitwerkingen)

C836 Fundamentals of Information security Terms updated 2024.

Beoordeling
-
Verkocht
-
Pagina's
20
Geüpload op
06-11-2024
Geschreven in
2024/2025

A Chinese military general who lived in the sixth century BC and wrote The Art of War, a text that shows early examples of operations security principles - ANSWER-Sun Tzu A client-side attack that takes advantage of some of the page rendering features that are available in newer browsers - ANSWER-Clickjacking A combination of a network design feature and a protective device such as a firewall; often used for systems that need to be exposed to external networks but are connected to our network (such as a web server) - ANSWER-Demilitarized Zone (DMZ) A combination of DAC and MAC, primarily concerned with the confidentiality of the resource. Two security properties define how information can flow to and from the resource: the simple security property and the * property. - ANSWER-The Bell-LaPadula model A firewall technology that can analyze the actual content of the traffic that is flowing through - ANSWER-Deep packet inspection A firewall technology that functions on the same general principle as packet filtering firewalls, but is able to keep track of the traffic at a granular level. Has the ability to watch the traffic over a given connection - ANSWER-Stateful packet inspection A firewall technology that inspects the contents of each packet in network traffic individually and makes a gross determination (based on source and destination IP address, port number, and the protocol being used) of whether the traffic should be allowed to pass - ANSWER-Packet filtering A fully featured sniffer that is also a great tool for troubleshooting traffic; this well-known tool is used by many network operations and security teams - ANSWER-Wireshark A group of tools that can include network mapping tools, sniffers, and exploits - ANSWER-Exploit framework

Meer zien Lees minder
Instelling
C836
Vak
C836










Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Instelling
C836
Vak
C836

Documentinformatie

Geüpload op
6 november 2024
Aantal pagina's
20
Geschreven in
2024/2025
Type
Tentamen (uitwerkingen)
Bevat
Onbekend

Onderwerpen

Voorbeeld van de inhoud

C836 Fundamentals of Information
security Terms updated 2024.

A Chinese military general who lived in the sixth century BC and wrote The Art of War, a text that
shows early examples of operations security principles - ANSWER-Sun Tzu



A client-side attack that takes advantage of some of the page rendering features that are available in
newer browsers - ANSWER-Clickjacking



A combination of a network design feature and a protective device such as a firewall; often used for
systems that need to be exposed to external networks but are connected to our network (such as a
web server) - ANSWER-Demilitarized Zone (DMZ)



A combination of DAC and MAC, primarily concerned with the confidentiality of the resource. Two
security properties define how information can flow to and from the resource: the simple security
property and the * property. - ANSWER-The Bell-LaPadula model



A firewall technology that can analyze the actual content of the traffic that is flowing through -
ANSWER-Deep packet inspection



A firewall technology that functions on the same general principle as packet filtering firewalls, but is
able to keep track of the traffic at a granular level. Has the ability to watch the traffic over a given
connection - ANSWER-Stateful packet inspection



A firewall technology that inspects the contents of each packet in network traffic individually and
makes a gross determination (based on source and destination IP address, port number, and the
protocol being used) of whether the traffic should be allowed to pass - ANSWER-Packet filtering



A fully featured sniffer that is also a great tool for troubleshooting traffic; this well-known tool is used
by many network operations and security teams - ANSWER-Wireshark



A group of tools that can include network mapping tools, sniffers, and exploits - ANSWER-Exploit
framework

,A hardware- and software-based technology that prevents certain portions of the memory used by
the operating system and applications from being used to execute code - ANSWER-Executable space
protection



A measure of how agreeable a particular characteristic is to the users of a system - ANSWER-
acceptability



A measure of the differences of a particular characteristic among a group of individuals - ANSWER-
Uniqueness



A mechanism for maintaining control over the traffic that flows into and out of our networks -
ANSWER-Firewall



A method by which a person follows directly behind another person who authenticates to the
physical access control measure, thus allowing the follower to gain access without authenticating -
ANSWER-Tailgating (also known as piggybacking)



A method of securing a message that involves generating a hash and encrypting it using a private key
- ANSWER-Digital signature



A method of security that involves designing a network to always have another route if something
fails or loses connection - ANSWER-Redundancy



A methodical examination and review that ensures accountability through technical means -
ANSWER-Auditing



A model that adds three more principles to the CIA triad: Possession or Control, Authenticity, and
Utility - ANSWER-Parkerian hexad



A monitoring tool that alerts when an attack or other undesirable activity is taking place - ANSWER-
Intrusion detection system (IDS)



A more active method of finding security holes that includes using the kinds of tools attackers use to
mimic an attack on our environment - ANSWER-Penetration testing

, A multilayered defense that will allow us to achieve a successful defense should one or more of our
defensive measures fail - ANSWER-defense in depth



A password is an example of this type of factor - ANSWER-Something you know



A phrase that refers to an organization's strategy and policies regarding the use of personal vs.
corporate devices - ANSWER-Bring your own device (BYOD)



A principle that states we should only allow a party the absolute minimum permission needed for it
to carry out its function - ANSWER-The principle of least privilege



A process that provides a history of the activities that have taken place in the environment -
ANSWER-Logging



A program that seeks to make users aware of the risk they are accepting through their current
actions and attempts to change their behavior through targeted efforts - ANSWER-Security
Awareness, Training, and Education (SATE)



A public list that holds all the revoked certificates for a certain period of time - ANSWER-Certificate
revocation list (CRL)



A security method that involves shifting the contents of memory around to make tampering difficult -
ANSWER-Address space layout randomization (ASLR)



A set of methods we use to establish a claim of identity as being true - ANSWER-Authentication



A set of metrics that judge how well a given system functions - ANSWER-performance measurement



A set of resources devoted to a program, process, or similar entity, outside of which the entity
cannot operate - ANSWER-Sandbox



A set of symmetric block ciphers endorsed by the US government through NIST. Shares the same
block modes that DES uses and also includes other modes such as XEX-based Tweaked CodeBook
(TCB) mode - ANSWER-AES
$20.49
Krijg toegang tot het volledige document:

100% tevredenheidsgarantie
Direct beschikbaar na je betaling
Lees online óf als PDF
Geen vaste maandelijkse kosten

Maak kennis met de verkoper
Seller avatar
aliciabernado2001

Maak kennis met de verkoper

Seller avatar
aliciabernado2001 Columbia International University
Bekijk profiel
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
0
Lid sinds
1 jaar
Aantal volgers
0
Documenten
89
Laatst verkocht
-

0.0

0 beoordelingen

5
0
4
0
3
0
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Veelgestelde vragen