

Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
CompTia Security+ Test 1 CompTia Security+ Test 1
Typology: Exams
1 / 2
This page cannot be seen from the preview
Don't miss anything!
Firewall - Software that checks information coming from the internet and depending on the applied configuration settings, either block it or allows it to pass through Router - Device Designed to forward data packets between networks Exception - Allowing a program through a firewall Load Balancer - A technique or network device used to distribute workload evenly across two or more routers, in order to get optimal resource utilization, maximize throughput, minimize response time, and avoid overload. Default rule of firewall - Deny all traffic Proxy - Computer network service that allows clients to make indirect network connections to other network services. MAC filtering - Solution designed to filtering malicious / restricted content from entering corporate networks Tunneling - Type of protocols that ensure the privacy of a VPN connection VPN concentrator - Dedicated device for managing secure connections established over an untrusted network Intrusion Detection System - Network or host based monitoring system designed to automatically alert administrators of known or suspected unauthorized activity. Packet Sniffer - Software tool used to monitor and examine contents of network traffic
Simple Mail Transfer Protocol - Protocol and port number used by a spam filter Unified Threat Management - Network Security Solution Combining the Functionality of a firewall with additional safeguards, such as URL filtering, content inspection, or malware inspection Network Intrusion Prevention System - Network security solution that inspects network traffic in real- time, has the capability to stop ongoing attack Web Application Firewall - Firewall controlling access to a web server Access Control List - Set of rules that specify which users or system processes are granted access to objects as well as what operations are allowed on a given object 802.1x - A IEEE standard designed to define port-based network access control as well as enhance security of wireless networks by authenticating a user to a central authority. Rule-Based - Type of access Control model; access to resources granted or denied depending on Access Control List (ACL) entries Anomaly-based - Type of IDS that relies on previously established baseline of normal network activity in order to detect intrusions Flood Guard - A feature that controls a device's tolerance for unanswered service requests and helps to prevent a DoS attack. Provides a countermeasure aginst denial-of-service attack characterized by increasing number of half- open connections. Hash-based Message Authentication Code - Protocol taht protect against switching loops Signature based - Type of Intrusion Detection System (IDS) that relies on known attack patterns to detect an intrusion