Acronyms
Terminology
Misc
Networks
100

DMZ

Demilitarized zone

100

A network segment between two firewalls.

DMZ

100

A periodic update that corrects problems in one version of a product is called a(n) __________.

A. Hotfix

B. Overhaul

C. Service pack

D. Security update

Service pack

100

Is an area where you can place a public server for access by people whom you might not trust otherwise

Typically between 2 firewalls


A demilitarized zone (DMZ)

200

IDS

Intrusion detection system

200

A network that functions in the same manner as a honeypot

honeynet

200

Which device monitors network traffic in a passive manner?

IDS

200

Allows an outside entity access to a part of your internal network.

Extranet

300

IPS

Intrusion prevention system

300

A fake system designed to divert attackers from your real systems

honeypot

300

What is a system that is intended or designed to be broken into by an attacker?

Honeypot

300

Accessible only within the organization’s network.

Intranet

400

PII

Personally identifiable information

400

A system that monitors the network for possible intrusions and logs that activity.

Intrusion detection system (IDS)

400

In intrusion detection system vernacular, which account is responsible for setting the security policy for an organization?

A. Supervisor

B. Administrator

C. Root

D. Director

Administrator

400

Most trusted wireless security protocol 

WPA2

500

ISO

International Organization for Standardization

500

A system that monitors the network for possible intrusions and logs that activity and then blocks the traffic that is suspected of being an attack.

Intrusion prevention system (IPS)

500

You are a junior security administrator for a large bank. You have been asked to make the database servers as secure as they can be. The process of making certain that an entity (operating system, application, and so on) is as secure as it can be is known as which of the following?

A. Stabilizing

B. Reinforcing

C. Hardening

D. Toughening

Hardening

500

Occurs when one or more systems are literally not connected to a network.

air-gap.

600

NIST

National Institute of Standards and Technology

600

Any information that could identify a particular individual.

Personally identifiable information (PII)

600

John is working on designing a network for the insurance company where he is employed. He wants to put the web server in an area that has somewhat less security so that outside users might access it. But he does not want that to compromise the security of the rest of the network. What would be John’s best approach?

A. Place the web server in a honeynet.

B. Place the web server on the guest network segment.

C. Place the web server in a DMZ.

D. Place the web server outside his network.

Place the web server in a DMZ.

600

A private network connection that occurs through a public network.

A virtual private network (VPN)

700

PCI-DSS

Payment Card Industry Data Security Standard

700

A firewall that not only examines each packet but also remembers the recent previous packets.

Stateful packet inspection (SPI)

700

You are concerned about your backup files becoming infected with malware. Which of the following technologies would be best to protect your backup?

A. Air-gap

B. SPI firewall

C. DMZ

D. VLAN

Air-gap

700

One of the first lines of defense in a network

Firewalls

M
e
n
u