200 Flashcards

1
Q

An asymmetric standard for exchanging keys

A

Diffie-Hellman key exchange

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An asymmetrically encrypted signature whose sole purpose is to authenticate the sender

A

digital signature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An attack that involves navigating to other directories and gaining access to files/directories that would be otherwise restricted

A

directory traversal attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The act of recovering data following a disaster that has destroyed it

A

disaster recovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A plan outlining the procedure by which data is recovered after a disaster

A

disaster-recovery plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A method of restricting access to objects based on the identity of the subjects or the groups to which they belong

A

Discretionary Access Control (DAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Technology that uses two controllers and two disks to keep identical copies of data to prevent the loss of data if one disk fails

A

disk duplexing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Technology that keeps identical copies of data on two disks to prevent the loss of data if one disk fails

A

disk mirroring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Technology that enables writing data to multiple disks simultaneously in small portions called stripes

A

disk striping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A fault-tolerance solution of writing data across a number of disks and recording the parity on another (also known as disk striping with a parity disk) In the event that any of disk fails - the data on it can be re-created by looking at the remaining data and computing parity to figure out the missing data

A

disk striping with parity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A derivative of a DoS attack in which multiple hosts in multiple locations all focus on one target to reduce its availability to the public

A

distributed denial-of-service (DDoS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

An attack method in which a daemon caches DNS reply packets - which sometimes contain other information (data used to fill the packets) The extra data can be scanned for information useful in a brea-in or man-in-the-middle attack

A

DNS poisoning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The DNS server is given information about a name server that it thinks is legitimate when it isn’t

A

DNS spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The network service used in TCP/IP networks that translates hostnames to IP addresses

A

Domain Name System (DNS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A host that resides on more than one network and possesses more than one physical network card

A

dual-homed firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Looking through trash for clues—often in the form of paper scraps—to find users’ passwords and other pertinent information

A

dumpster diving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A protocol used on a TCP/IP network to send client configuration data - including IP address - default gateway - subnet mask - and DNS configuration - to clients

A

Dynamic Host Configuration Protocol (DHCP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The IEEE standard that defines port-based security for wireless network access control

A

EAP over LAN (EAPOL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Dynamic provisioning of resources as needed

A

elasticity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

The interference that can occur during transmissions over copper cable because of electromagnetic energy outside the cable

A

electromagnetic interference (EMI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A device that identifies you electronically in the same way as the cards you carry in your wallet

A

electronic wallet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A type of public key cryptosystem that requires a shorter key length than many other cryptography systems (including the de facto industry standard - RSA)

A

Elliptic Curve Cryptography (ECC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A header used to provide a mix of security services in IPv4 and IPv6

A

Encapsulating Security Payload (ESP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

The process of enclosing data in a packet

A

encapsulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

The process of converting data into a form that makes it less likely to be suable to anyone intercepting it if they cant decrypt it

A

encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

A string of alphanumeric characters used to decrypt encrypted data

A

encryption key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

The process of luring someone

A

enticement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

The process of encouraging an attacker to perform an act - even if they don’t want to do it

A

entrapment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

A key that exists only for that session

A

ephemeral key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

The act of moving something up in priority

A

escalation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

A level of assurance - expressed as a numeric value - based on standards set by the Common Criterion Recognition Agreement (CCRA)

A

evaluation assurance levels (EALs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Any noticeable action or occurrence

A

event

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

A statement that differs from the norm

A

exception statement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

An authentication protocol used in wireless networks and point-to-point connections

A

Extensible Authentication Protocol (EAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

The process of reconstructing a system or switching over to other systems when failure is detected

A

failover

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

An event that should be flagged but isn’t

A

false negative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

A flagged event that isn’t really an event and has been falsely triggered

A

false positive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

An electrically conductive wire mesh or other conductor woven into a “cage” that surrounds a room and prevents electromagnetic signals from entering or leaving the room through the walls

A

Faraday cage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

The ability to withstand a fault (failure) without losing data

A

fault tolerance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

A networking protocol that is not routable at the IP layer and thus cannot work across large networks

A

FCoE (Fibre Channel over Ethernet)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

A set of guidelines for US federal government information systems

A

Federal Information Processing Standard (FIPS)

42
Q

A means of linking a user’s identity with their privileges in a manner that can be used across business boundaries

A

federated identity

43
Q

A collection of computer networks that agree on standards of operation - such as security standards

A

federation

44
Q

A high-speed networking technology

A

Fibre Channel

45
Q

Microsoft’s earliest filesystem

A

File Allocation Table (FAT)

46
Q

TCP/IP and software that permit transferring files between computer systems and use cleartext passwords

A

File Transfer Protocol (FTP)

47
Q

The act of stopping a fire and preventing it from spreading

A

fire suppression

48
Q

A combination of hardware and software that protects a network from attack by hackers who could gain access through public networks - including the Internet

A

firewall

49
Q

A system that is up and running at least 99.999 percent of the time

A

five nines availability

50
Q

The process of systematically identifying the network and its security posture

A

footprinting

51
Q

In terms of security - the act of looking at all the data at your disposal to try to figure out who gained unauthorized access and the extent of that access

A

forensics

52
Q

A property of any key exchange system that ensures that if one key is compromised - subsequent keys will not also be compromised

A

forward secrecy

53
Q

A secure form of FTP

A

FTP over SSL (FTPS)

54
Q

A concept that works on the assumption that any information created on any system is stored forever

A

Full Archival method

55
Q

A backup that copies all data to the archive medium

A

full backup

56
Q

An information classification stating that the data so classified is available to anyone

A

full distribution

57
Q

A technique of penetration testing

A

fuzzing

58
Q

Vulnerability possible when the interconnection between the WAP server and the Internet isnt encrypted and packets between the devices may be intercepted

A

gap in the WAP

59
Q

One of the most popular methods of backup tape rotation

A

Grandfather - Father - Son method

60
Q

Virtual machines running on a physical machine

A

guests

61
Q

Rules - policies - or procedures that are advisory or nonmandatory

A

guidelines

62
Q

The process of making certain that an entity (such as an operating system or application) is as secure as it can be

A

hardening

63
Q

A system that bases actions on the heuristics it observes

A

heuristic system

64
Q

A newer backup type that provides continuous online backup by using optical or tape jukeboxes

A

hierarchical storage management (HSM)

65
Q

A trust model - also known as a tree - in which a root CA at the top provides all of the information

A

hierarchical trust model

66
Q

A clustering solution to provide resource reliability and availability

A

high availability (HA)

67
Q

A mechanism for message authentication using cryptographic hash functions per the draft of the Federal Information Processing Standards (FIPS) publication

A

HMAC (Hash-Based Message Authentication Code)

68
Q

Typically an email message warning of something that isn’t true - such as an outbreak of a new virus

A

hoax

69
Q

A bogus system set up to attract and slow down a hacker

A

honeypot

70
Q

Any network device with a TCP/IP network address or physical machines running virtual machines

A

host

71
Q

An intrusion detection system that is host based

A

host-based IDS (HIDS)

72
Q

A server room aisle that removes hot air

A

hot aisles

73
Q

A location that can provide operations within hours of a failure

A

hot site

74
Q

Another word for a patch

A

hotfix

75
Q

A cryptoprocessor chip (or circuit mounted within the computer) that can be used to enhance security and is commonly used with PKI systems

A

HSM (Hardware Security Module)

76
Q

A combination of HTTP with Secure Sockets Layer (SSL) that results in a secure connection It uses port 443 by default

A

HTTP Secure (HTTPS

77
Q

A password attack that uses a combination of dictionary entries and brute force

A

hybrid attack

78
Q

Cloud delivery model that combines other types

A

hybrid cloud

79
Q

A trust model that can use the capabilities of any or all of the structures of other trust models

A

hybrid trust model

80
Q

A set of codes used to format text and graphics that will be displayed in a browser

A

Hypertext Markup Language (HTML)

81
Q

The protocol used for communication between a web server and a web browser

A

Hypertext Transfer Protocol (HTTP)

82
Q

Also known as HTTPS and HTTP Secure

A

Hypertext Transport Protocol over SSL (HTTPS)

83
Q

The software that allows virtual machines to exist

A

hypervisor

84
Q

The process of proofing invoked when a person claims that they are the user but cannot be authenticated - such as when they lose their password

A

identity proofing

85
Q

Pretending to be another to gain information

A

impersonation

86
Q

A condition that states that unless otherwise given - the permission will be denied

A

implicit deny

87
Q

An attempt to violate a security policy - a successful penetration - a compromise of a system - or unauthorized access to information

A

incident

88
Q

How an organization responds to an incident

A

incident response

89
Q

A policy that defines how an organization will respond to an incident

A

incident response plan (IRP)

90
Q

A type of backup in which only new files or files that have changed since the last full backup or the last incremental backup are included

A

incremental backup

91
Q

The process of determining what information is accessible to what parties and for what purposes

A

information classification

92
Q

A model of cloud computing that utilizes virtualization; clients pay an outsourcer for the resources used

A

Infrastructure as a Service (IaaS)

93
Q

Immediate communication that can be sent back and forth between users who are currently logged on

A

instant messaging (IM)

94
Q

An international organization that sets standards for various electrical and electronics issues

A

Institute of Electrical and Electronics Engineers (IEEE)

95
Q

Putting too much information into too small of a space that has been set aside for numbers

A

integer overflow

96
Q

An obstruction to the signal

A

interference

97
Q

An information classification stating that the data so classified is limited to internal employees only

A

internal information

98
Q

An algorithm that uses a 128-bit key

A

International Data Encryption Algorithm (IDEA)

99
Q

Organization responsible for communications standards - spectrum management and the development of communications infrastructures in underveloped nations

A

International Telecommunications Union (ITU)

100
Q

The organization responsible for governing IP addresses; its website is www

A

Internet Assigned Numbers Authority (IANA)