• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/52

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

52 Cards in this Set

  • Front
  • Back
What are the three types of patches?
Service Pack – Periodic update, corrects known problems.
Updates – Fixes for individual customers
Security updates – Address security vulnerabilities
What is hardening?
The process of securing a system by reducing its surface of vulnerability. (i.e. removing unwanted software, disabling unneeded services, etc)
What are alerts?
Issues you need to pay attention to, but are not immediately critical.
What are alarms?
Indications of ongoing, current problems.
Define:



EAPOL
Extensible Authentication Protocol Over LAN
What is a:



Network Monitor
Also known as sniffers, they were originally introduced to help troubleshoot network problems.
What is:



Promiscuous mode
A mode in which the network card looks at any packet that it sees on the network, even if that packet is not addressed to that network card
What are:



Event Logs
System logs that record various events that occur
What is the:



Windows Application Log
Contains various events logged by applications or programs
What is the:


Windows Security Log
Logs successful and unsuccessful logon attempts , events related to resource use (such as creating, opening, or deleting files or other objects)
What is:



Performance Monitor
A utility that can be used to examine activity on any counter (i.e. processor or RAM usage)
What are four aspects of a security audit?
Review of security logs
Review of policies and compliance with policies
A check of security device configuration
Review of incident response reports
What are the three classifications of security gaps?
Minor – This is a deviation from the security baseline that does not pose an immediate threat
Serious – This is a deviation that could pose an immediate threat, but is unlikely or difficult
Critical – This is a deviation that poses an immediate threat that must be addressed ASAP
What are the three types of patches?
Service Pack – Periodic update, corrects known problems.
Updates – Fixes for individual customers
Security updates – Address security vulnerabilities
What is hardening?
The process of securing a system by reducing its surface of vulnerability. (i.e. removing unwanted software, disabling unneeded services, etc)
What are alerts?
Issues you need to pay attention to, but are not immediately critical.
What are alarms?
Indications of ongoing, current problems.
Define:



EAPOL
Extensible Authentication Protocol Over LAN
What is a:



Network Monitor
Also known as sniffers, they were originally introduced to help troubleshoot network problems.
What is:



Promiscuous mode
A mode in which the network card looks at any packet that it sees on the network, even if that packet is not addressed to that network card
What are:



Event Logs
System logs that record various events that occur
What is the:



Windows Application Log
Contains various events logged by applications or programs
What is the:


Windows Security Log
Logs successful and unsuccessful logon attempts , events related to resource use (such as creating, opening, or deleting files or other objects)
What is:



Performance Monitor
A utility that can be used to examine activity on any counter (i.e. processor or RAM usage)
What are four aspects of a security audit?
Review of security logs
Review of policies and compliance with policies
A check of security device configuration
Review of incident response reports
What are the three classifications of security gaps?
Minor – This is a deviation from the security baseline that does not pose an immediate threat
Serious – This is a deviation that could pose an immediate threat, but is unlikely or difficult
Critical – This is a deviation that poses an immediate threat that must be addressed ASAP
What are the three types of patches?
Service Pack – Periodic update, corrects known problems.
Updates – Fixes for individual customers
Security updates – Address security vulnerabilities
What are the three types of patches?
Service Pack – Periodic update, corrects known problems.
Updates – Fixes for individual customers
Security updates – Address security vulnerabilities
What is hardening?
The process of securing a system by reducing its surface of vulnerability. (i.e. removing unwanted software, disabling unneeded services, etc)
What are alerts?
Issues you need to pay attention to, but are not immediately critical.
What are alarms?
Indications of ongoing, current problems.
Define:



EAPOL
Extensible Authentication Protocol Over LAN
What is a:



Network Monitor
Also known as sniffers, they were originally introduced to help troubleshoot network problems.
What is:



Promiscuous mode
A mode in which the network card looks at any packet that it sees on the network, even if that packet is not addressed to that network card
What are:



Event Logs
System logs that record various events that occur
What is the:



Windows Application Log
Contains various events logged by applications or programs
What is the:


Windows Security Log
Logs successful and unsuccessful logon attempts , events related to resource use (such as creating, opening, or deleting files or other objects)
What is:



Performance Monitor
A utility that can be used to examine activity on any counter (i.e. processor or RAM usage)
What are four aspects of a security audit?
Review of security logs
Review of policies and compliance with policies
A check of security device configuration
Review of incident response reports
What are the three classifications of security gaps?
Minor – This is a deviation from the security baseline that does not pose an immediate threat
Serious – This is a deviation that could pose an immediate threat, but is unlikely or difficult
Critical – This is a deviation that poses an immediate threat that must be addressed ASAP
What is hardening?
The process of securing a system by reducing its surface of vulnerability. (i.e. removing unwanted software, disabling unneeded services, etc)
What are alerts?
Issues you need to pay attention to, but are not immediately critical.
What are alarms?
Indications of ongoing, current problems.
Define:



EAPOL
Extensible Authentication Protocol Over LAN
What is a:



Network Monitor
Also known as sniffers, they were originally introduced to help troubleshoot network problems.
What is:



Promiscuous mode
A mode in which the network card looks at any packet that it sees on the network, even if that packet is not addressed to that network card
What are:



Event Logs
System logs that record various events that occur
What is the:



Windows Application Log
Contains various events logged by applications or programs
What is the:


Windows Security Log
Logs successful and unsuccessful logon attempts , events related to resource use (such as creating, opening, or deleting files or other objects)
What is:



Performance Monitor
A utility that can be used to examine activity on any counter (i.e. processor or RAM usage)
What are four aspects of a security audit?
Review of security logs
Review of policies and compliance with policies
A check of security device configuration
Review of incident response reports
What are the three classifications of security gaps?
Minor – This is a deviation from the security baseline that does not pose an immediate threat
Serious – This is a deviation that could pose an immediate threat, but is unlikely or difficult
Critical – This is a deviation that poses an immediate threat that must be addressed ASAP