Sys301

Sys301 - Term Definition What are Ports 20/21 used for FTP...

Info icon This preview shows pages 1–8. Sign up to view the full content.

View Full Document Right Arrow Icon
Term: What are Ports 20/21 used for? Definition: FTP Term: What is Port 22 used for? Definition: Secure Shell (SSH) Term: What is Port 23 used for? Definition: Telnet Term: What is Port 25 used for? Definition: SMTP Term: What is Port 53 used for? Definition: DNS
Image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Term: What is Port 69 used for? Definition: TFTP Term: What is Port 80 used for? Definition: HTTP Term: What is Port 88 used for? Definition: Kerberos Term: What is Port 110 used for? Definition: POP3 Term: What is Port 143 used for? Definition: IMAP
Image of page 2
Term: What is Port 443 used for? Definition: SSL/HTTPS Term: What are Ports 161/162 used for? Definition: SNMP Term: What are Ports 137/138 used for? Definition: NetBios Term: What is Port 995 used for? Definition: pop3s Term: What is Port 1433 used for? Definition: SQL
Image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Term: What type of audit can be used to determine if accounts have been established correctly and verify that privilege creep isn't occurring? Definition: Privilege Audit Term: What kind of physical access device restricts access to a smaller number of individuals at one time? Definition: Mantrap Term: A Voluntary set of Standards governing encryption Definition: Public-Key Cryptography Standards Term: Protocol used to create a secure environment in a wireless network? Definition: WEP Term: Internet Server interfaces with TCP/IP at which layer of the DOD model? Definition: Process Layer
Image of page 4
Term: Which technology would allow you to establish a network connection between two LAN's using the internet? Definition: L2TP Term: Design concept which limits access to systems from the outside users while protecting users and systems inside the LAN? Definition: DMZ Term: In the Key Recovery Process Definition: what key must be recoverable? Term: Which component of IDS collects Data? Definition: Sensor Term: What is the process of making an operating system secure from attack called? Definition: Hardening
Image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Term: The integrity objective addresses which characteristics of information security? Definition: Verification that information is accurate. Term: Which mechanism is used by PKI to allow immediate verification of a certificates validity? Definition: OCSP Term: _________ is the equivalent of a VLAN from a physical security perspective. Definition: Partitioning Term: _________ is a Mechanism or process used to enable or disable access to a network resource based on IP address. Definition: ACL Term: Program that exists primarily to propagate itself to other systems? Definition: Worm
Image of page 6
Term: Type of Attack in which a person present themselves at a location asking questions about server configurations? Definition: Social Engineering Term: 123456 is an example of what? Definition: Weak Passwords Term: What is a major security problem with FTP Servers? Definition: User Id's and Passwords are unencrypted. Term: What system provides active protection and notification of security problems Definition: IDS Term: A ________ __ _________ is a process of verifying the steps taken to maintain integrity of forensic evidence?
Image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Image of page 8
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern