100 Flashcards

1
Q

Agreed-upon principles set forth by a company to govern how the employees of that company may use resources such as computers and Internet access

A

acceptable use policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The means of giving or restricting user access to network resources

A

access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A table or data file that specifies whether a user or group has access to a specific resource on a computer or network

A

access control list (ACL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The point at which access to a network is accomplished This term is often used in relation to a wireless access point (WAP)

A

access point (AP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A policy that provides information to the reader about who to contact if a problem is discovered

A

accountability statement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A response generated in real time

A

active response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Any action a user undertakes

A

activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Protocol used to map known IP addresses to unknown physical addresses

A

Address Resolution Protocol (ARP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

An attack that convinces the network that the attacker’s MAC address is the one associated with an allowed address so that traffic is wrongly sent to attacker’s machine

A

Address Resolution Protocol (ARP) poisoning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A control implemented through administrative policies or procedures

A

administrative control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The user who is accountable and responsible for the network

A

administrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A Federal Information Processing Standards (FIPS) publication that specifies a cryptographic algorithm for use by the US government

A

Advanced Encryption Standard (AES)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

More commonly known as ARP poisoning - this involves the MAC (Media Access Control) address of the data being faked

A

ARP spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

An algorithm that uses two keys

A

asymmetric algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Encryption in which two keys must be used

A

asymmetric encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Any unauthorized intrusion into the normal operations of a computer or computer network

A

attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The area of an application that is available to users—those who are authenticated and - more importantly - those who are not

A

attack surface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Minimizing the possibility of exploitation by reducing the amount of code and limiting potential damage

A

attack surface reduction (ASR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The act of tracking resource usage by users

A

audit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

The means of verifying that someone is who they say they are

A

authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A header used to provide connectionless integrity and data origin authentication for IP datagrams and to provide protection against replays

A

Authentication Header (AH)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A type of certificate technology that allows ActiveX components to be validated by a server

A

Authenticode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A utility used with Windows 7 and 8 for creating a copy of the configuration settings necessary to reach the present state after a disaster

A

Automated System Recovery (ASR) disk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

An opening left in a program application (usually by the developer) that allows additional access to data

A

backdoor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

A reversion - or roll back to a previous state - from a change that had negative consequences

A

backout

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

A usable copy of data made to media

A

backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

A generator that can supply power in the event the primary provider is unable to deliver it

A

backup generator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

A documented plan governing backup situations

A

backup plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

A written policy detailing the frequency of backups and the location of storage media

A

backup policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Looking at the banner - or the header information messages sent with data - to find out about a system(s)

A

banner grabbing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Comparing performance to a historic metric

A

baselining

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

A host with multiple network interface cards so that it can reside on multiple networks

A

bastion host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

A set of rules governing basic operations

A

best practices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Data that is too large to be dealt with by traditional database management means

A

Big Data analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

A probability method of finding collision in hash functions

A

birthday attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

A Microsoft utility used to encrypt a drive

A

BitLocker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

A method of encryption that processes blocks of data rather than streams

A

block cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

A type of symmetric block cipher created by Bruce Schneier

A

Blowfish

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

The sending of unsolicited messages over a Bluetooth connection

A

bluejacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

The gaining of unauthorized access through a Bluetooth connection

A

bluesnarfing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

A router used to translate from LAN framing to WAN framing

A

border router

42
Q

An automated software program (network robot) that collects information on the Web

A

bot

43
Q

A trust model in which a peer-to-peer relationship exists among the root certificate authorities

A

bridge trust model

44
Q

A type of attack that relies purely on trial and error and tries all possible combinations

A

brute-force attack

45
Q

A type of denial-of-service (DoS) attack that occurs when more data is put into a buffer than it can hold - thereby overflowing it (as the name implies)

A

buffer overflow

46
Q

A contingency plan that allows a business to keep running in the event of a disruption to vital resources

A

business continuity planning (BCP)

47
Q

A study of the possible impact if a disruption to to a business’s vital resources were to occur

A

business impact analysis (BIA)

48
Q

A physical security deterrent used to protect a computer

A

cable lock

49
Q

An access point that requires users to agree to some condition before they use the network or Internet

A

captive portal

50
Q

A type of symmetric block cipher defined by RFC 2144

A

CAST

51
Q

A digital entity that establishes who you are and is often used with e-commerce

A

certificate

52
Q

An issuer of digital certificates (which are then used for digital signatures or key pairs)

A

certificate authority (CA)

53
Q

A messaging protocol used between PKI entities

A

Certificate Management Protocol (CMP

54
Q

The principles and procedures employed in the issuing and managing of certificates

A

Certificate Practice Statement (CPS)

55
Q

The act of making a certificate invalid

A

certificate revocation

56
Q

A list of digital certificate revocations that must be regularly downloaded to stay current

A

certificate revocation list (CRL)

57
Q

A protocol that challenges a system to verify identity

A

Challenge Handshake Authentication Protocol (CHAP)

58
Q

Management included in the making of a change in the scope of any particular item

A

change management

59
Q

An algorithm - also known as a cryptographic algorithm - used to encrypt and decrypt data

A

cipher

60
Q

The part of a client-server network where the computing is usually done

A

client

61
Q

A surveillance camera used for physical-access monitoring

A

closed-circuit television (CCTV)

62
Q

Moving the execution of an application to the cloud on an as-needed basis

A

cloud bursting

63
Q

A model for enabling ubiquitous - convenient - on-demand network access to a shared pool of configurable computing resources”

A

cloud computing

64
Q

A method of balancing loads and providing fault tolerance

A

clustering

65
Q

The storage and conditions for release of source code provided by a vendor - partner - or other party

A

code escrow

66
Q

Looking at all custom written code for holes that may exist

A

code review

67
Q

Server room aisles that blow cold air from the floor

A

cold aisles

68
Q

A physical site that can be used if the main site is inaccessible (destroyed) but that lacks all the resources necessary to enable an organization to use it immediately

A

cold site

69
Q

An agreement between individuals to commit fraud or deceit

A

collusion

70
Q

A standard identification card used by the Department of Defense(DoD) and other employers

A

Common Access Card (CAC)

71
Q

A document of specifications detailing security evaluation methods for IT products and systems

A

Common Criteria (CC)

72
Q

Cloud delivery model in which the infrastructure is shared by organizations with something in common

A

community cloud

73
Q

A virus that creates a new program that runs in place of an expected program of the same name

A

companion virus

74
Q

Gap controls that fill in the coverage between other types of vulnerability mitigation techniques (where there are holes coverage - we compensate for them

A

compensating controls

75
Q

A formalized or an ad hoc team you can call upon to respond to an incident after it arises

A

Computer Security Incident Response Team (CSIRT)

76
Q

Type of communications between two hosts that have a previous session established for synchronizing sent data

A

connection-oriented protocol

77
Q

A plan that allows a business to keep running in the event of a disruption to vital resources

A

contingency plan

78
Q

Processes or actions used to respond to situations or events

A

control

79
Q

Technical or administrative measures in place to assist with resource management

A

control types

80
Q

A plain-text file stored on your machine that contains information about you (and your preferences) and is used by a server

A

cookie

81
Q

A wrapper that uses 128-bit AES encryption with a 48-bit initialization vector

A

Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP)

82
Q

Functions on which the livelihood of the company depends

A

critical business functions (CBF)

83
Q

A form of web-based attack in which unauthorized commands are sent from a user that a website trusts

A

Cross-Site Request Forgery (XSRF)

84
Q

Running a script routine on a user’s machine from a website without their permission

A

cross-site scripting (XSS)

85
Q

The study and practice of finding weaknesses in ciphers

A

cryptanalysis

86
Q

A person who does cryptanalysis

A

cryptanalyst

87
Q

A person who participates in the study of cryptographic algorithms

A

cryptographer

88
Q

An algorithm - also known as a cipher - used to encrypt and decrypt data

A

cryptographic algorithm

89
Q

The field of mathematics focused on encrypting and decrypting data

A

cryptography

90
Q

Getting rid of/destroying media no longer needed

A

data disposal

91
Q

The primary standard used in government and industry until it was replaced by AES

A

Data Encryption Standard (DES)

92
Q

Any systems that identify - monitor - and protect data to prevent it from unauthorized use - modification - or destruction”

A

data loss prevention (DLP)

93
Q

A policy dealing with some aspect of data (usage - destruction - retention - etc

A

data policy

94
Q

A response that fools the attacker into thinking that the attack is succeeding while the system monitors the activity and potentially redirects the attacker to a system that is designed to be broken

A

deception active response

95
Q

An area for placing web and other servers outside the firewall

A

demilitarized zone (DMZ)

96
Q

A type of attack that prevents any users—even legitimate ones— from using a system

A

denial-of-service (DoS)

97
Q

Reviewing the security design - including examining the ports and protocols used - the rules - segmentation - and access control

A

design review

98
Q

Controls that are intended to identify and characterize an incident in progress (for example - sounding the alarm and altering the administrator)

A

detective control

99
Q

The act of attempting to crack passwords by testing them against a list of dictionary words

A

dictionary attack

100
Q

A type of backup that includes only new files or files that have changed since the last full backup

A

differential backup