Chapter 13 Test Prep

studied byStudied by 7 people
5.0(1)
Get a hint
Hint

Firewall

1 / 37

flashcard set

Earn XP

Description and Tags

38 Terms

1

Firewall

Protect a network with a strong firewall to prevent external intruders from gaining access to the network.

New cards
2

Network Intrusion Detection System NIDS

Implement an NIDS, or better yet, an NIPS to detect intrusion attempts. A NIPS is preferable because it can also block intrusion attempts.

New cards
3

Email Security Appliance

Implement an email security appliance to automatically scan and then quarantine any suspect messages before they reach end-users within the organization.

New cards
4

Network Access Control (NAC)

A collection of components that allow administrators to regulate network access and communication based on a computer's compliance with health requirement policies.

New cards
5

Something you know

This type of authentication requires users to provide a password or some other data that they know. This is the weakest type of authentication.

New cards
6

Something you have

This type of authentication uses something users have in their possession.

New cards
7

Something you are

This type of authentication uses a biometric system. A biometric system attempts to identify a person based on metrics or a mathematical representation of the subject's biological attributes. This is the most expensive and least accepted authentication method, but it is generally considered the most secure form of authentication.

New cards
8

Somewhere you are

This type of authentication uses where you are accessing the information from, such as an IP address, Coordinates, or a house address.

New cards
9

Something you do

This type of authentication uses the unique way you do something, such as writing your signature, or writing a word.

New cards
10

False Negative

Also called a Type I error, occurs when a person who should be allowed access is denied access.

New cards
11

False Positive

Occurs when person who should be denied access is allowed access.

New cards
12

Crossover Error Rate

Also called the equal error rate, is the point where the number of false positives matches the number of false negatives in a biometric system. I

New cards
13

Processing Rate

Also known as system throughput, identifies the number of subjects or authentication attempts that can be validated. An acceptable rate is at least ten subjects per minute.

New cards
14

One-Factor Authentication

Uses only one type of credential, but may require multiple methods within the same type.

New cards
15

Two, Three, or Multiple Factor Authentication

Requires two or more authentication types.

New cards
16

Strong Authentication Method

Requires two or more methods, but they can be of the same type.

New cards
17

Mutual Authentication Method

Requires that both parties authenticate with each other before beginning communications.

New cards
18

Kerberos (Auth Service)

A free protocol that provides strong authentication for client/server applications using a secret-key cryptography that allows the client to prove identity across an unsecure network connection.

New cards
19

IEEE 802.1X (Auth Service)

A port-based authentication service where the client, called supplicant, initiates the authentication. A network device, called authenticator, negotiates the authentication. An authentication server, called host, is accessed after the supplicant is authenticated.

New cards
20

Captive Portal (Auth Service)

A web page that pops up when you access a public Wi-Fi.

New cards
21

Challenge Handshake Authentication Protocol \n (CHAP)

A three-way handshake (challenge/response) authentication protocol used for remote access connections. Both connection devices are configured with a password called a shared secret. For unique user authentication, this value is associated with a user account.

New cards
22

Microsoft Challenge Handshake Authentication Protocol \n (MS-CHAP)

Microsoft's proprietary challenge-response authentication method used for remote access connections

New cards
23

Extensible Authentication Protocol \n (EAP)

Allows the client and server to negotiate the characteristics of authentication.

New cards
24

/etc/passwd

A file that contains the user account information.

New cards
25

/etc/shadow

A file that contains the user passwords in an encrypted format. This file is linked to the /etc/passwd file.

New cards
26

/etc/group

As with Active Directory, you can use groups to simplify user access to network resources. This file contains information about each group.

New cards
27

/etc/default/useradd

This file contains default values used by the useradd utility when creating a user account, such as Group ID, home directory, or account expiration.

New cards
28

/etc/login.defs

A file that contains Values used for the group and user ID numbers, parameters for passwords encryption in the shadow file and password expiration values for user accounts.

New cards
29

/etc/skel

This directory contains a set of configuration file templates that are copied into a new user's home directory when it is created, including the following files: .bashrc, .bash_logout, .bash_profile, .kshrc

New cards
30

useradd

Creates a user account.

New cards
31

passwd

Used to change a users current password.

New cards
32

usermod

esModify an existing user account.

New cards
33

userdel

Removes the user from the system.

New cards
34

Quality updates

Are deployed monthly (usually the second Tuesday of the month). Include security fixes and software updates. Include any missed updates.

New cards
35

Feature updates

Are also called builds, Created to provide new features and functions, Released as a new version of the Windows operating system.

New cards
36

Servicing stack updates

the code that installs Windows updates.

New cards
37

Driver updates

.To keep systems running smoothly, it is important to keep all of these updated. Windows update usually updates all of these that have been registered with Microsoft

New cards
38

Microsoft Product Updates

Provides updates for products such as Office.

New cards

Explore top notes

note Note
studied byStudied by 1 person
... ago
5.0(1)
note Note
studied byStudied by 5 people
... ago
5.0(1)
note Note
studied byStudied by 8 people
... ago
4.0(1)
note Note
studied byStudied by 3 people
... ago
5.0(1)
note Note
studied byStudied by 160 people
... ago
4.5(2)
note Note
studied byStudied by 78 people
... ago
5.0(2)
note Note
studied byStudied by 83 people
... ago
5.0(1)
note Note
studied byStudied by 61530 people
... ago
4.9(335)

Explore top flashcards

flashcards Flashcard (21)
studied byStudied by 4 people
... ago
4.0(1)
flashcards Flashcard (59)
studied byStudied by 1 person
... ago
4.0(1)
flashcards Flashcard (206)
studied byStudied by 2 people
... ago
5.0(1)
flashcards Flashcard (47)
studied byStudied by 3 people
... ago
5.0(1)
flashcards Flashcard (83)
studied byStudied by 5 people
... ago
5.0(1)
flashcards Flashcard (119)
studied byStudied by 12 people
... ago
4.0(1)
flashcards Flashcard (106)
studied byStudied by 6 people
... ago
5.0(1)
flashcards Flashcard (51)
studied byStudied by 27 people
... ago
4.0(1)
robot