Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

C836 EXAM AND REVIEW UPDATED 2022

Rating
5.0
(1)
Sold
-
Pages
9
Grade
A+
Uploaded on
19-10-2024
Written in
2024/2025

C836 EXAM AND REVIEW UPDATED 2022

Institution
Course

Content preview

C836 EXAM AND REVIEW UPDATED 2022/2023 CHAPTER 1 TO
chapter 6
first and most important step of operational security - ANSWER: identify our most
critical information assets

threat - ANSWER: something that has the potential to cause harm to us

vulnerabilities - ANSWER: weaknesses that can be used to harm us

ex: security controls not very rigorous that can allow one to easily change source
code

risk occurs when.. - ANSWER: when we have a matching threat and vulnerability

deterrent controls - ANSWER: designed to discourage those who might seek to
violate our security controls from doing so

deterrent examples - ANSWER: signs in public spaces that might indicate that video
monitoring is in place, violations for breaking the law..

detective - ANSWER: serve to detect and report undesirable events taking place

detective example - ANSWER: burglar alarms and physical intrusion detection
systems

preventive controls - ANSWER: used to physically prevent unauthorized entities from
breaching our physical security

physical security example - ANSWER: simple mechanical lock or high fences

(RAID) redundant arrays of inexpensive disks - ANSWER: used to ensure we do

Magnetic Media - ANSWER: Hard drives, floppy drives and tape drives

sensitive to magnetic fields

flash media - ANSWER: sturdy and resilient

optical media - ANSWER: CDs and DVDs

sensitive to temperature and even scratching that can render media unusable

physical controls - ANSWER: locks, fences, cameras, security guards, lighting

, more complex security measures, such as the use of iris scanners, mantraps, and
identification badges

administrative controls - ANSWER: background checks, periodic drug tests

main method of ensuring availability - ANSWER: backups like RAIDs

subnet - ANSWER: small network divided from a larger network

firewall - ANSWER: a mechanism for maintaining control over the traffic that flows
into and out of our network

packet filtering - ANSWER: looks at the contents of each packet in the traffic
individually and makes a gross determination, based on the source and destination
IP addresses, the port number, and the protocol being used, of whether the traffic
will be allowed to pass.

Since each packet is examined individually and not in concert with the rest of the
packets comprising the content of the traffic, it can be possible to slip attacks
through this type of firewall.

stateful packet inspection - ANSWER: like packet filtering but able to keep track of
traffic on a granular level

will only allow traffic through that is part of a new or already established connection

knows when the connection has been closed and further traffic should not
legitimately be present

deep packet inspection - ANSWER: capable of analyzing the actual content of the
traffic that is flowing through them

proxy servers - ANSWER: serve as a choke point in order to allow us to filter traffic
for attacks or undesirable content such as malware or traffic to Web sites hosting
adult content

DMZ (demilitarized zone) - ANSWER: layer of protection between the device, such as
our mail server, and the Internet, and between the rest of our network and the
device

Signature based IDses - ANSWER: They maintain a database of the signatures that
might signal a particular type of attack and compare incoming traffic to those
signatures

works well, except when we encounter an attack that is new, or has been specifically
constructed in order to not match existing attack signatures

Connected book

Written for

Course

Document information

Uploaded on
October 19, 2024
Number of pages
9
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$18.49
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF


Also available in package deal

Reviews from verified buyers

Showing all reviews
1 year ago

5.0

1 reviews

5
1
4
0
3
0
2
0
1
0
Trustworthy reviews on Stuvia

All reviews are made by real Stuvia users after verified purchases.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
jrein8742 Teachme2-tutor
Follow You need to be logged in order to follow users or courses
Sold
4
Member since
1 year
Number of followers
1
Documents
405
Last sold
1 year ago

4.7

333 reviews

5
252
4
62
3
15
2
4
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions