This describes the weakness of a system that could lead to compromised information or unauthorized access
What is a vulnerability?
This can capture all traffic traversing a network connection.
What is a TAP (test access point)?
This app is used to create flow records that show relationships among various traffic types
What is NetFlow?
This is the logical group of Windows Servers controlling the network access to a group of computers
What is a domain?
This is a distinct network of storage devices that communicate directly with each other and with other portions of the network
What is a Storage Area Network (SAN)?
This isa popular penetration testing tool that combines known scanning and exploit techniques to explore potentially new attack routes.
What is metasploit?
Which firewall protects the computer on which it is installed
What is a host-based firewall?
This is used to monitors traffic at a specific interface between a server or client and the network
What is a protocol analyzer?
This is the maximum allowable distance for horizontal cabling.
What is 100m/328ft?
This is where a wireless signal is split into secondary waves upon encountering an obstruction
What is diffraction?
This provides a tracking system that is used by vulnerability databases
What is CVE (Common Vulnerabilities and Exposures)?
This is a device or application that stores or generates information known only to its authorized user.
What is a security token?
This is a bandwidth management technique that adjusts the way network devices respond to indications of network performance issues caused by traffic congestion throughout a network.
What is Congestion control?
This is the range of Well-known ports.
What is 0-1023?
The average amount of time required to repair a device is known by this measurement.
What is MTTR (mean time to repair)?
This tool is designed to scan large networks quickly and provide information about a network and its hosts
What is NMAP?
This monitoring alerts the system of any changes made to files that shouldn't change, such as operating system files
What is file integrity monitoring (FIM)?
Which CLI tool will let you measure the throughput between network hosts?
What is IPERF?
This transport protocol is used for small requests, such as DNS.
What is UDP?
This feature is characterized by a single switch supporting traffic belonging to several VLANs across a network
What is VLAN Trunking?
This is a decoy system that is purposely vulnerable and filled with what appears to be sensitive (though false) content
What is a honeypot?
This device stands in-line between the attacker and the targeted network or host where it can prevent traffic from reaching that network or host
What is an IPS?
This backup strategy backs up only the data that has changed since the last backup?
What is an incremental backup?
This type of signal may travel in only one direction.
What is simplex?
This can be configured to follow policies that might avoid a certain router or instruct a group of routers to prefer one route over other available routes.
What is border gateway protocol?