The first measure in physically securing a building.
What is a perimeter barrier?
Researching a company in order to find critical details.
What is organizational reconnaissance?
When perpetrators attempt to compromise or affect the operations of a system in some way.
What is an active attack?
A self-replicating program.
What is a worm?
Uses labels for both subjects (users who need access) and objects ( resources with controlled access, such as data, applications, systems, networks, and physical space).
What is Mandatory Access Control (MAC)?
A preventative tool (when monitoring live events) or an investigative tool (when events are recorded for later playback).
What is a CCTV (Closed-Circuit Television)?
Changes the IP address information within a packet.
What is IP spoofing?
Allows a user to take advantage of a software bug or design flaw in an application to gain access to system resources or additional privileges that aren't typically available to that user.
What is privilege escalation?
Consists of an attacker trying to correctly guess many passwords or passphrases.
What is a brute force attack?
An open system that can be used on Macintosh and Unix systems.
What is Kerberos?
Ensures that hardware does not leave the organization's premises without a manager's approval.
What is a checkout policy?
Used on most internal networks, usually in the intranet zone, so that internal users do not require a physical connection.
What is a wireless network?
Allows users to share content and access content shared by other users without centralized servers or centralized access control.
What is peer-to-peer software?
A collection of patches, hotfixes, and other system enhancements that have been tested by the manufacturer for wide deployment.
What are service packs?
Used by Microsoft for auditing to identify past actions performed by users on an object.
What is a System Access Control List?
Where most of the network devices and cables are stored.
What is a data center?
Allows traffic directed to the public resources inside the DMZ. Also prevents unauthorized traffic from reaching the private network.
What is a packet filter?
Overloads the switch's MAC forwarding table to make the switch function like a hub.
What is MAC flooding?
TCP/IP protocol that provides no authentication, encryption, or error detection.
What is TFTP?
An attack where software or malware is downloaded and installed without explicit consent from the user.
What is a drive-by download?
A reduction in voltage that lasts longer than a few seconds.
What is a brownout?
Inspects traffic as it flows between networks.
What is a network-based firewall?
A logical grouping of computers based on switch port.
What is a VLAN?
Provides information about which operating system a computer uses and might provide entry points or information about ways to formulate an attack.
What are open ports?
A program that adds functionality and features to a Web browser, including extra toolbars and interactive Web content.
What are Add-ons (Plug-ins or Browser Extensions)?