Ap Networking Unit 3

0.0(0)
studied byStudied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/24

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 1:55 AM on 1/28/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

25 Terms

1
New cards

Confidentiality

ensures data is accessible to only authorized users

ie. encryption, access, controls, authentication

2
New cards

integrit

ensures data is accurate, unaltered, and trustworthy

3
New cards

availability

ensures data and systems are accessible when needed

ie. redundancy, backups

4
New cards

Administrative controls

security policies, password policies, acceptable use policy, training and awareness, incident response plans

5
New cards

technical controls

firewalls, port security, IDS/IPS, antivirus, encryption, VLANs

6
New cards

physical controls

locks, badges, cameras, fences, secured server rooms

7
New cards

Preventive controls

stop incidents before they happende

8
New cards

deterrent

discourage attacks

9
New cards

detective

identify incidents after or during occurrence

10
New cards

corretive

fix damage after an icdient

11
New cards

recovery

restore operations

12
New cards

comprehensive

combine multiple control types

13
New cards

mac spoofing

changing a mac address to impersonate another device, gaining unauthorized access

14
New cards

mac flooding

sending a lot of fake mac addresses, fills cam table, forces the switch to flood traffic out all ports

15
New cards

protect

drops unauthorized traffic silently

16
New cards

restrict

drops traffic and logs violation

17
New cards

shutdown

disables the port

18
New cards

which violation action is the more secure?

shutdown

19
New cards

what does firewalls control?

traffic flow based on ip, addresses, ports, protocols, connection states

20
New cards

stateless firewalls

filter packets individually, use header data only, fast with low overhead, no awareness of sessions

21
New cards

stateful firewalls

tracks, active connections, understands session context, more secure than stateless, but high resource usage

22
New cards

new generation firewalls

stateful inspection, application awareness, IDS/IPS capabilites

23
New cards

intrusion detection system (IDS)

detects intruders and alters about them

24
New cards

intrusion prevention system (IPS)

detects intruders and blocks them from doing harm

25
New cards

defense in depth

a layered security approach that assumes no single control is sufficient. Includes: physical, administrative, and techination securities, policies, and enforcement

Explore top notes