ITSS 4360 - Network & Information Security Exam 2 Review Sheet

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/16

flashcard set

Earn XP

Description and Tags

A set of flashcards summarizing key concepts covered in the ITSS 4360 Network & Information Security Exam 2.

Last updated 3:48 PM on 4/6/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

17 Terms

1
New cards

What is network segmentation?

The practice of splitting a network into smaller, isolated sections to improve performance and security.

2
New cards

What is a DMZ in network security?

A sub-network that contains an organization’s external-facing services to act as a buffer between the untrusted internet and the private internal network.

3
New cards

What is the difference between East-West and North-South traffic?

North-South traffic moves in and out of the data center (client to server), while East-West traffic moves between servers within the data center.

4
New cards

What is a stateful inspection firewall?

A firewall that tracks the state of active connections and allows return traffic automatically if it belongs to an established session.

5
New cards

What is an IDS?

Intrusion Detection System, a detective control that monitors traffic and alerts administrators of suspicious activity.

6
New cards

What does a Load Balancer do?

Distributes incoming network traffic across multiple servers to ensure high availability and prevent server overload.

7
New cards

What is a honeypot?

A decoy system designed to lure attackers away from production systems and gather intelligence on their methods.

8
New cards

What is DNSSEC?

A security extension that provides authentication and integrity for DNS data through digital signatures.

9
New cards

What are the categories of hypervisors?

Type 1 hypervisors run directly on hardware (Bare Metal), and Type 2 hypervisors run as applications on existing Operating Systems (Hosted).

10
New cards

What does IaaS stand for?

Infrastructure as a Service, where the provider manages hardware and the customer manages OS, apps, and data.

11
New cards

What is the purpose of a captive portal?

A web page that forces a user to authenticate or accept terms before gaining network access.

12
New cards

What is the AAA Framework?

Authentication, Authorization, and Accounting, which defines user verification, permissions, and tracking activities.

13
New cards

What is MFA?

Multi-Factor Authentication, which requires multiple forms of verification to gain access.

14
New cards

What is the primary function of Kerberos?

To provide Single Sign-On (SSO) in Windows Active Directory environments using 'tickets'.

15
New cards

What is the main objective of incident response?

To effectively manage and mitigate security incidents by following a structured lifecycle.

16
New cards

What are Recovery Time Objective (RTO) and Recovery Point Objective (RPO)?

RTO is the maximum acceptable time to restore a system; RPO is the maximum acceptable amount of data loss measured in time.

17
New cards

What are the OSI Model layers from the top to the bottom?

Layer 7 - Application, Layer 6 - Presentation, Layer 5 - Session, Layer 4 - Transport, Layer 3 - Network, Layer 2 - Data Link, Layer 1 - Physical.

Explore top flashcards

flashcards
Unit 5 #53-103
53
Updated 341d ago
0.0(0)
flashcards
Q3 SOC SCI QE chapter 12
38
Updated 1118d ago
0.0(0)
flashcards
Personal Finance Midterm Vocab
22
Updated 1174d ago
0.0(0)
flashcards
Chapter 3 Key Concepts
31
Updated 188d ago
0.0(0)
flashcards
Unit 5 #53-103
53
Updated 341d ago
0.0(0)
flashcards
Q3 SOC SCI QE chapter 12
38
Updated 1118d ago
0.0(0)
flashcards
Personal Finance Midterm Vocab
22
Updated 1174d ago
0.0(0)
flashcards
Chapter 3 Key Concepts
31
Updated 188d ago
0.0(0)