Security and Backups

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/47

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

48 Terms

1
New cards

Line interactive UPS

surge protection more volrtage no interruption

2
New cards

on line double interactive UPS

always on no switching no interuption but even bette

3
New cards

PDU

power distribution unit usually a rack

4
New cards

generator

takes time to kick in need a UPS before it starts

5
New cards

active-passive redundancy

one fails other activates

6
New cards

active - active

both are active on same time

7
New cards

diverse paths

have multiple ISPs but need lots of configs to work

8
New cards

FHRP

first hop redundancy protocol, provide redudnacy for a local gateway with high avaibliility

9
New cards

VRRP

virtual router redundancy,device uses a virtual IP to get to gateway but multiple routers can use that IP

10
New cards

RTO

recovery time objective

11
New cards

RPO

recovery point objective

12
New cards

MTTR

mean time to repair

13
New cards

MTBF

mean time between failures

14
New cards

CIA

confiedntaily integritiy avaliablility

15
New cards

confidneialty

encyprtion acces control steganoghpry

16
New cards

avaliability

fault tolerance patching redundancy

17
New cards

integrity

data transffered hashing signatutes certifcations non repudation

18
New cards

2 vulnerability databases

CVE and NVD

19
New cards

zero trust

no trust even when within system constant re authenication

20
New cards

physical controls

access card vestibule security gaurd

21
New cards

tehcnical

hardware/software, disk encryption, active directory

22
New cards

adminstrative

policy procedures onboard off board, media handling

23
New cards

Physical segmentation vs logical segmentation

physical is 2 diferent routers oth is VLAN

24
New cards

DMZ

screened subnet addtional layer between internet

25
New cards

seperation of duties

multiple poeple are needed to do everything like having 2 keys

26
New cards

NAC

network access control use 802.1X to control physical interface security

27
New cards

802.1X

is used for port security

28
New cards

AAA

authenication authorization and accounting

29
New cards

TACACS

way to authenicate used by cisco

30
New cards

RADIUS

authenication used not just by windows

31
New cards

LDAP

users x.500 standard used in windows and apple

32
New cards

kerberos

single SSO mutual authenication

33
New cards

posture assessment

see if a device is secure enough to connect to a network

34
New cards

risk with vendors

put in a contract

35
New cards

swtich spoofing

used to VLAN hop by pretending to be a switch works if trunk negotation is auto enabled

36
New cards

double tagging

put 2 vlans tags once sent one is removed then forwarded to target VLAN stop use of native VLAN

37
New cards

rogue DHCP server

DHCP has no security, so monitor for rogue DHCP and use AD to authorize certain DHCP servers

38
New cards

virus

generic you isntall

39
New cards

worm

move from system to system without users knowledge

40
New cards

rootkit

take control of computer

41
New cards

what fixed deauth

802.11w is required for 802.11ac and up

42
New cards

tailgating vs piggybacking

piggybacking is with consent

43
New cards

RA gaurd

stop attacker from pretending to be an IPv6 router, so swtiches will validate an RA

44
New cards

DAI

dynamic ARP inspection, switch keeps IP tables and ignores bad requests

45
New cards

piority in security

pioritize control layer and disable unnecassary controls

46
New cards

port isolation

no device communication

47
New cards

dhcp snooping

will track IPs and notify of rogue DHCP servers

48
New cards

implicit vs explicit deny

explicity deny might be wanted for warning or tracking