1/19
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Remote access
It refers to any combination of hardware and software that enables users to access a local internal network remotely
Secure Shell (SSH)
It is a protocol that provides a secure (encrypted) management connection to a remote device.
True
True or False:
SSH should replace Telnet for management connections.
Telnet
is an older protocol that uses unsecure plaintext transmission of both the login authentication (username and password) and the data transmitted between the communicating devices.
Secure copy (SCP)
It securely transfers computer files between two remote systems.
Secure copy (SCP)
It uses SSH for data transfer (including the authentication element), so this one, ensures the authenticity and confidentiality of the data in transit.
Securing Ports and Services
Cyber criminals exploit the services running on a system because they know that most devices run more services or programs than they need. So what are the best things to do?
Privileged accounts
Cyber criminals exploit _______________________________________ because they are the most powerful accounts in the organization.
Privileged accounts
It have the credentials to gain access to systems and they provide elevated, unrestricted access.
Privileged accounts
Administrators use these accounts to deploy and manage operating systems, applications, and network devices. These account should be secured or removed to mitigate these risks
Group Policies
In most networks that use Windows computers, an administrator configures Active Directory with Domains on a Windows Server.
password,
lockout
An administrator configures user account policies such as ______________________ policies and _____________________ policies by adding users to groups and setting policy at a group level.
log
It records events as they occur on a system.
Log entries
It make up a log file, and also it contains all of the information related to a specific event.
power
A critical issue in protecting information systems is electrical _____________ systems and ___________________ considerations
True
True or False;
A continuous supply of electrical power is critical in today's massive server and data storage facilities.
Hardware Monitoring
It is often found in large server farms.
server farm
It is a facility that houses hundreds or thousands of servers for companies.
Heating, Ventilation, and Air Conditioning (HVAC)
These systems are critical to the safety of people and information systems in the organization's facilities. When designing modern IT facilities, these systems play a very important role in the overall security.
Heating, Ventilation, and Air Conditioning (HVAC)
These systems control the ambient environment (temperature, humidity, airflow, and air filtering) and must be planned for and operated along with other data center components such as computing hardware, cabling, data storage, fire protection, physical security systems and power.