click below
click below
Normal Size Small Size show me how
Chapter 2 Terms
Security+ SY0-501 7th Edition Terms (Chapter 2)
| Question | Answer |
|---|---|
| demilitarized zone (DMZ) | A network segment between two firewalls. One is outward facing, connected to the outside world, the other inward facing, connected to the internal network. Public-facing servers, such as web servers, are often placed in a DMZ. |
| honeynet | A network that functions in the same manner as a honeypot. |
| honeypot | A fake system designed to divert attackers from your real systems. It is often replete with logging and tracking to gather evidence. |
| information security management system (ISMS) | A broad term that applies to a wide range of systems used to manage information security. |
| intrusion detection system (IDS) | A system that monitors the network for possible intrusions and logs that activity. |
| intrusion prevention system (IPS) | A system that monitors the network for possible intrusions and logs that activity and then blocks the traffic that is suspected of being an attack. |
| personally identifiable information (PII) | Any information that could identify a particular individual. |
| software-defined network (SDN) | The entire network, including all security devices, is virtualized. |
| stateful packet inspection (SPI) | A firewall that not only examines each packet but also remembers the recent previous packets. |