Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

C836 EXAM

Beoordeling
-
Verkocht
-
Pagina's
9
Cijfer
A+
Geüpload op
13-10-2024
Geschreven in
2024/2025

Exam study book Durability of Building and Construction Sealants and Adhesives of Andreas T. Wolf - ISBN: 9780803134140 (C836 EXAM)

Instelling
Vak

Voorbeeld van de inhoud

C836 EXAM AND REVIEW UPDATED 2022/2023 CHAPTER 1 TO
chapter 6
first and most important step of operational security - ANSWER: identify our most
critical information assets

threat - ANSWER: something that has the potential to cause harm to us

vulnerabilities - ANSWER: weaknesses that can be used to harm us

ex: security controls not very rigorous that can allow one to easily change source
code

risk occurs when.. - ANSWER: when we have a matching threat and vulnerability

deterrent controls - ANSWER: designed to discourage those who might seek to
violate our security controls from doing so

deterrent examples - ANSWER: signs in public spaces that might indicate that video
monitoring is in place, violations for breaking the law..

detective - ANSWER: serve to detect and report undesirable events taking place

detective example - ANSWER: burglar alarms and physical intrusion detection
systems

preventive controls - ANSWER: used to physically prevent unauthorized entities from
breaching our physical security

physical security example - ANSWER: simple mechanical lock or high fences

(RAID) redundant arrays of inexpensive disks - ANSWER: used to ensure we do

Magnetic Media - ANSWER: Hard drives, floppy drives and tape drives

sensitive to magnetic fields

flash media - ANSWER: sturdy and resilient

optical media - ANSWER: CDs and DVDs

sensitive to temperature and even scratching that can render media unusable

physical controls - ANSWER: locks, fences, cameras, security guards, lighting

, more complex security measures, such as the use of iris scanners, mantraps, and
identification badges

administrative controls - ANSWER: background checks, periodic drug tests

main method of ensuring availability - ANSWER: backups like RAIDs

subnet - ANSWER: small network divided from a larger network

firewall - ANSWER: a mechanism for maintaining control over the traffic that flows
into and out of our network

packet filtering - ANSWER: looks at the contents of each packet in the traffic
individually and makes a gross determination, based on the source and destination
IP addresses, the port number, and the protocol being used, of whether the traffic
will be allowed to pass.

Since each packet is examined individually and not in concert with the rest of the
packets comprising the content of the traffic, it can be possible to slip attacks
through this type of firewall.

stateful packet inspection - ANSWER: like packet filtering but able to keep track of
traffic on a granular level

will only allow traffic through that is part of a new or already established connection

knows when the connection has been closed and further traffic should not
legitimately be present

deep packet inspection - ANSWER: capable of analyzing the actual content of the
traffic that is flowing through them

proxy servers - ANSWER: serve as a choke point in order to allow us to filter traffic
for attacks or undesirable content such as malware or traffic to Web sites hosting
adult content

DMZ (demilitarized zone) - ANSWER: layer of protection between the device, such as
our mail server, and the Internet, and between the rest of our network and the
device

Signature based IDses - ANSWER: They maintain a database of the signatures that
might signal a particular type of attack and compare incoming traffic to those
signatures

works well, except when we encounter an attack that is new, or has been specifically
constructed in order to not match existing attack signatures

Gekoppeld boek

Geschreven voor

Vak

Documentinformatie

Geüpload op
13 oktober 2024
Aantal pagina's
9
Geschreven in
2024/2025
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$18.49
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper
Seller avatar
morrismuriithi009
3.0
(1)

Ook beschikbaar in voordeelbundel

Maak kennis met de verkoper

Seller avatar
morrismuriithi009 Teachme2-tutor
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
1
Lid sinds
1 jaar
Aantal volgers
0
Documenten
760
Laatst verkocht
5 maanden geleden

3.0

1 beoordelingen

5
0
4
0
3
1
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen