Save
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

Security + CompTIA

Domain 2

TermDefinition
Packet filtering firewalls firewall that operates at layer 3
Proxy-service firewalls firewall type; including circuit level (session layer Layer 5) and application level (application layer 7)
Stateful inspection firewalls deeper inspection firewall that analyze traffice patterns and data flows
Stateless firewall work as a basic access control list filter
NIDS & NIPS designed to catch attacks in progress within the network, not just on individual machines or the boundary between public & private networks
Proxy Servers placed between private network and internet for internet connectivity, can also be placed in ternally for web content caching
Protocol analyzers device that can be placed inline or between devices from which you want to capture the traffic
Intrusion detection managed by two basic methods: knowledge-based and behavior-based detection
IDS monitors packet data using behavior based (to identify anomalies or knowledge-based methods, operating in netowkr based or host based configurations
Spanning Tree Prevents broadcast loops on Layer 2, protocol
Flood guard firewall feature to control network activity associated with Dos attacks
DMZ Small network between internal and internet that provides a layer of privacy
SIEM Tools Security Information Event Management: these tools collect correlate and display data feeds that support response activities
WORM technology Write Once Read Many - ideal for log data which is written once and cannot be modified
802.1X - Network Access Control this access control offers a method of enforcement that helps ensure computers are properly configured. - TSA holding chamber
VPN Concentrator used to allow multiple external users to access internal network resources using secure features that are built into the device. multiple VPN tunnels
HIDS - Host intrusion detection system, implemented to monitor event and application logs, port access, and other running processes
DLP - Data Loss Prevention - way of preventing confidential data from being exfiltrated physically or logically from an organization by accident or on purpose
HSM - Hardware Security Module - designed to protect critical cryptographic keys and to accelerate sensitive cryptographic operations across a wide range of security applications.
False positive occurs when a typical or expected behavior is identified as irregular or malicious
false negative occurs when an alert that should have been generated did not occur
honeypots & honeynets used to study actions of hackers and distract them from more valuable data
nmap network scanning tool often used in security auditing
netstat shows network statistics which include protocol, local address, foreign address and connection state
nbtstat helps troubleshoot windows name resolution issues
dig troubleshooting tool that queries DNS servers
Auditing user permissions common method of identifying access violations and issues
Common Firewall Config Errors allows traffic to run from any source to any destination, unnecessary services running, weak authentication and log file negligence
misconfigured web content filter prevents legitimate content or allows prohibited content
DEP - Data Execution Protection - prevents malware from executing in memory space reserved for operating system processes
File integrity checker tool which computes cryptographic hash and compares the result to known good values to ensure file has not been modified
HTTP Port # 80 - unencrypted
HTTPS port # 443
FTP SSH TCP port port 22 by default
Popular Standardized Tests sets

 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards