Network
Ability to permit or deny privileges
Access Control
An attack where you manipulate a person to do something for you
Social Engineering
A machine created and accessed through software
VM (Virtual Machine)
A decentralized ledger that records and verifies transactions between two parties
Blockchain
Routers and IP addresses function at what layer of the OSI model?
Layer 3 (Network)
Process of controlling access to resources such as computers, files, or printers
Authorization
An attack that will bring a server or service down due to an overload of traffic
DDoS
The software that hosts your guest operating systems/hardware
Hypervisor
(What did we use for the Hack Box?)
Verifying the data is legitimate is called this
Digital Signatures
Which layer is the same for both models?
Transport
Maintaining a record of a subject's activity within the network
Auditing
These computers are utilized for DDoS attacks
Zombie (Botnet)
A main reason to use virtualization, which disperses the work load between many devices
Load Balancing
A type of encryption that uses the same key for encryption and decryption
Symmetric Encryption
The two layers used to put data on the wire
Layer 1 and 2
An access control principle which implements multiple layers of security
Defense-in-Depth
An attack that will grant you greater access than you should have
Privilege Escalation
A cloud that can be accessed by anyone
Public Cloud
The process of converting data values into an encryption
Hashing
SSL operates at which layer of the OSI model?
Layer 5 (Session)
Term for validating a subjects identity
Authentication
Remaps the IP and MAC addresses
ARP Poisoning
A virtual service that can be utilized by companies that allows them to backup data offsite
Cloud Storage
The government standard hash algorithm
SHA (Secure Hash Algorithm)