100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
SEC401 Study Guide $9.49   Add to cart

Exam (elaborations)

SEC401 Study Guide

 4 views  0 purchase
  • Course
  • SEC401
  • Institution
  • SEC401

Prepare for the SEC401 exam with our comprehensive study guide. Get the latest tips, key concepts, and practice questions to boost your cybersecurity knowledge

Preview 3 out of 26  pages

  • July 22, 2024
  • 26
  • 2023/2024
  • Exam (elaborations)
  • Questions & answers
  • SEC401
  • SEC401
avatar-seller
academicexpert
SEC401 Study Guide
1. Virtual Sprawl: Condition in an operating environment where
number of virtual machines exceed number that can be managed
or secured effectively.
2. VM Escape Tactics: Use of compromised Guest OS to escape
sandbox and take over other Guest OS or hypervisor
3. Hypervisor: Software that runs on a physical computer and
manages one or more virtual machine operating systems.
4. Defense in Depth: A defense that uses multiple types of
security devices to protect a network. Also called layered security.
5. Middleware: Several different types of software that sit
between and provide connectivity for two or more software
applications
6. Net Flow: Cisco product that collects and monitors network
traffic.
7. Protected Enclaves: An approach to defence-in-depth that
involves segmenting your network using multiple VPNs, VLAN
segmentation, switches, or firewalls to separate out networks.
Reducing the exposure of a system can greatly reduce risk.
Restricting access to critical segments.
8. Least Privilege: Providing only the minimum amount of
privileges necessary to perform a job or function.

,9. Whitelisting: a process in which a company identifies
acceptable software and permits it to run, and either prevents
anything else from running or lets new software run in a
quarantined environment until the company can verify its validity
10. CSMA/CD: Short for carrier sense multiple access with
collision detection. It is the method for multiple hosts to
communicate on a Ethernet.
11. Layer 1: Physical Layer
12. Layer 2: Data Link Layer
13. Layer 3: Network Layer
14. Layer 4: Transport Layer
15. Layer 5: Session Layer - Setup, maintain, and break down a
dialog session between two applications, controls the dialog
organization and synchronization
16. Layer 6: Presentation Layer - Format the data into
standardized format and deals with the syntax of data, not the
meaning
17. Layer 7: Application Layer: Enables user and applications to
access network services (#)
18. CDP: Cisco Discovery Protocol
19. CDP Manipulation: Exploit of CDP traffic to compromise
network devices

, 20. XSS: Cross-site scripting. It scripting allows an attacker to
redirect users to malicious websites and steal cookies. E-mail can
include an embedded HTML image object or a JavaScript image
tag as part of a malicious cross-site scripting attack. Websites
prevent cross-site scripting attacks with input validation to detect
and block input that include HTML and JavaScript tags. Many sites
prevent the use of < and >
characters to block cross-site scripting.
21. SYN flood attack: An attack that takes advantage of the
procedures for initiating a TCP/IP session.
22. Type 1 Hypervisor: Also known as a bare metal hypervisor it
is a software program that acts as an operating system and also
provides the ability to perform virtualization of other operating
systems using the same computer.
23. GDPR: General data protection regulation (2016) companies
have 2 years to transition to GDPR compliance (from EU
directive) after the final text is published
24. VM Introspection: Hypervisor implementation of monitoring
of virtual environ- ment
25. DMA: Direct Memory Access
26. Hyperjacking: An attacker could hijack a VM hypervisor (VM
controlling soft- ware) and then use it as a launch point to attack
other devices on the data center network.

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller academicexpert. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $9.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

75323 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$9.49
  • (0)
  Add to cart