Border Firewall Correct Answer Separates the protected
network from the internet
Business to Business (B2B) Correct Answer Business conduct
sales with other businesses
Business to Consumer (B2C) Correct Answer Customers
purchase goods and services directly from a website
Common Protocols Correct Answer - Domain Name Service
(DNS)
- File Transfer Protocol (FTP)
- FTP over SSL/TLS
- HTTP
- HTTP over SSL/TLS
- Simple Network Management Protocol (SNMP)
,Common threats to the LAN Domain Correct Answer -
Unauthorized access
- OS/Software vulnerabilities
- Unauthorized access by rogue users
- Compromised confidentiality of data on WLANs
- Varying hardware and software between LAN servers
Common threats to the LAN-to-WAN Domain Correct Answer
- Unauthorized network probing and port scanning
- Denial of service attacks
- IP router, firewall, and network appliance OS vulnerabilities or
poor configuration
- Remote user access
- Download of unknown files or attachments
Common threats to the Remote Access Domain Correct Answer
- Brute force user ID attacks
- Multiple logon tries
- Access control attacks
- Unauthorized remote access
- Data leakage in violation of classification standards
- Stolen laptops/computers
- Authentication token stolen
Common threats to the System/Application Domain Correct
Answer - Unauthorized access to data centers or computer
rooms
- Downtime
- OS vulnerability
- Insecure cloud computing
, Common threats to the WAN Domain (Connectivity) Correct
Answer - Commingling of WAN IP traffic on the same service
provider router and infrastructure
- Using simple network management protocol applications
Common threats to the WAN Domain (Internet) Correct
Answer - Open, public, and accessible data
- Internet traffic sent as cleartext
- Vulnerable to eavesdropping and malicious attacks
- Corruption of data
- Insecure transmission control protocol / internet protocol
- Hackers, attackers, trojans, worms and malicious software
Confidential Data Correct Answer Information or data owned
by the organization
Data Classification Standards Correct Answer - Private data
- Confidential data
- Internal use data
- Public domain data
DDoS (Distributed DoS) Correct Answer Uses multiple
compromised systems to flood the network from many different
directions
DoS Correct Answer Flooding a network with traffic and
shutting down a single point of failure
Drivers for the Evolution of the Internet of Things? Correct
Answer - IP based networking has been globally adopted
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Classroom. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $12.99. You're not tied to anything after your purchase.