This class was created by Brainscape user parabellum smith. Visit their profile to learn more about the creator.

Decks in this class (21)

Module 1
Reasons for network security,
Provides comprehensive security a...,
Responsible for investigating and...
68  cards
Module 2
Are anything of value to an organ...,
A potential danger to an asset su...,
A weakness in a system or its des...
170  cards
Module 3
Are responsible for maintaining d...,
Security specialist job roles wit...,
Regardless of job titles network ...
137  cards
Module 4
Are a primary target for attacks ...,
The ____ is the last router betwe...,
Edge router security approaches
76  cards
Module 5
Cisco ios software has two method...,
___ access provides more granular...,
By default the cisco ios software...
60  cards
Quiz 1
A company has several sales offic...,
What is an objective of a state s...,
Used to probe and test a firewall...
27  cards
Module 6
The cisco ios resilient configura...,
Here are a few facts about the ci...,
To secure the ios image and enabl...
93  cards
Module 7
Is a technology that allows authe...,
Network and administrative aaa se...,
Cisco provides two common methods...
63  cards
Module 8
1  cards
Module 9
A ___ is a system or group of sys...,
All firewalls share some common p...,
There are several benefits of usi...
37  cards
Module 10
There are two configuration model...,
There are several benefits of a zpf,
Designing zpfs involves several s...
18  cards
Module 11
____ is a cyberattack that tries ...,
_____ were implemented to passive...,
Working offline the ids compares ...
88  cards
Module 12
A ____ is a set of rules that an ...,
Signatures also have three distin...,
There are two types of signatures
53  cards
Quiz 2
1  cards
Module 13
There are two internal lan elemen...,
Traditional endpoint securitythe ...,
Borderless network
39  cards
Module 14
Is considered to be the weakest l...,
Includes mac table overflow also ...,
Includes vlan hopping and vlan do...
58  cards
Module 15
To ensure secure communications a...,
There are three primary objective...,
Authenticationthere are two prima...
78  cards
Module 16
Four elements of secure communica...,
Guarantees that the message is no...,
Data integrity guarantees that th...
95  cards
Module 17
Are a mathematical technique used...,
The following are characteristics...,
The signature cannot be forged an...
45  cards
Module 18
1  cards
Module 19
1  cards

More about
NetSec

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study parabellum smith's NetSec flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

Make Flashcards