300 Flashcards

1
Q

A message and management protocol for TCP/IP

A

Internet Control Message Protocol (ICMP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An international organization that works under the Internet Architecture Board to establish standards and protocols relatings to the Internet

A

Internet Engineering Task Force (IETF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The network layer responsible for routing - IP addressing - and packaging

A

Internet layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A protocol with a store-and-forward capability

A

Internet Message Access Protocol (IMAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The protocol in the TCP/IP suite responsible for network addressing

A

Internet Protocol (IP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A set of protocols that enable encryption - authentication - and integrity over IP

A

Internet Protocol Security (IPSec)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A professional membership group composed primarily of Internet experts

A

Internet Society (ISOC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The act of entering a system without authorization to do so

A

intrusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Tools that identify and respond to attacks using defined rules or logic

A

intrusion detection system (IDS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Penetration-type testing that involves trying to break into the network

A

intrusive tests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Making the data look as if it came from a trusted host when it didn’t (thus spoofing the IP address of the sending host)

A

IP spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A protocol that enables the creation of storage area networks (SANs) and is used in sending storage-related commands over IP networks

A

iSCSI (Internet Small Computer Systems Interface)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

An attack that involves looking at repeated results in order to crack the WEP secret key

A

IV attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Purposely obstructing or interfering with a signal

A

jamming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A policy of rotating employees through various jobs

A

job rotation policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The ability of a filesystem to use a log file of all changes and transactions that have occurred within a set period of time (for example - the last few houres) If a crash occurrs - the operating system can look at the log files to see what transactions have been committed and which ones have not

A

journaling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

An authentication scheme that uses tickets (unique keys) embedded within messages

A

Kerberos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A principle that states that the security of an algorithm should depend only on the secrecy of the key and not on the secrecy of the algorithm itself

A

Kerckhoffs’s principle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

An organization or facility that generates keys for users and is a part of Kerberos

A

key distribution center (KDC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

An agency that stores keys for the purpose of law-enforcement access

A

key escrow agency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A method of offering mutual authentication and establishing data encryption keys

A

Key Exchange Algorithm (KEA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

The act of creating keys for use by users

A

key generation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

The temporary deferment of a key for a period of time (such as for a leave of absence

A

key suspension

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

The wait time between the call for an action or activity and the actual execution of that action

A

latency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

The concept that access differs at different levels

A

lattice-based control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

A tunneling protocol often used with virtual private networks (VPNs) L2F was developed by Cisco

A

Layer 2 Forwarding (L2F)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

A tunneling protocol that adds functionality to the Point-to-Point (PPP) This protocol was created by Microsoft and Cisco - and it is often used with virtual private networkds (VPNs)

A

Layer 2 Tunneling Protocol (L2TP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Exploiting weaknesses in LDAP (Lightweight Directory Access Protocol) Implementations by not properly filtering input

A

LDAP injection attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

A permission method in which users are granted only the privileges necessary to perform their job function

A

least privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

The policy of giving a user only the minimum permissions needed to do the work that must be done

A

least privilege policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

A set of protocols that was derived from x

A

Lightweight Directory Access Protocol (LDAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

An authentication protocol created by Cisco as an extension to EAP

A

Lightweight Extensible Authentication Protocol (LEAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Assigning a quantitative number to the chance that something will occur

A

likelihood

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Limiting network access to a list of the MAC addresses associated with known users computers

A

MAC filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

A software exploitation virus that works by using the macro feature included in many applications - such as Microsoft Office

A

macro virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Any code that is meant to do harm

A

malicious code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

A threat from someone inside the organization intent on doing harm

A

malicious insider threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

A security policy in which labels are used to identify the sensitivity of objects

A

Mandatory Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

A policy requiring earned vacation time be used or lost

A

mandatory vacation policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

An attack that occurs when someone/something that is trusted intercepts packets and retransmits them to another party

A

man-in-the-middle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

A device - such as a small room - that limits access to one or a few individuals

A

mantrap

42
Q

The measurement of the anticipated incidence of failure of a system or component

A

mean time between failures (MTBF)

43
Q

The measurement of the average of how long it takes a system or compnent to fail

A

mean time to failure (MTTF)

44
Q

The measurement of how long it takes to repair a system or component once a failure occurs

A

mean time to restore (MTTR)

45
Q

A sublayer of the Data Link layer of the Open Systems Interconection (OSI) model that controls the way multiple devices use the same media channel

A

Media Access Control (MAC)

46
Q

A trust model that expands the concepts of the bridge model by supporting multiple paths and multiple root certificate authorities

A

mesh trust model

47
Q

A common method of verifying integrity

A

Message Authentication Code (MAC)

48
Q

The cryptographic hash containing a string of digits within a message

A

message digest

49
Q

In a three-tier database model - this server accepts requests from clients - evaluates them - and then sends them on to the database server for processing

A

middle-tier server

50
Q

An intrusion detection system that works by detecting misuse

A

misuse-detection IDS (MD-IDS)

51
Q

Residing on more than one network

A

multihomed

52
Q

A virus that attacks a system in more than one way

A

multipartite virus

53
Q

Whenever two or more parties authenticate each other

A

mutual authentication

54
Q

An agency (formerly known as the National Bureau of Standards [NBS]) that has been involved in developing and supporting standards for the US government for over 100 years

A

National Institute of Standards and Technology (NIST)

55
Q

The US government agency responsible for protecting US communications and producing foreign intelligence information

A

National Security Agency (NSA

56
Q

An organization with the purpose of collecting “known - traceable software applications” through their hash values and storing them in a Reference Data Set (RDS) for law enforcement

A

National Software Reference Library (NSRL

57
Q

Technology that requires a user to bring the client close to the AP in order to verify (often through the RFID or Wi-Fi) that the device is present

A

near field communication (NFC)

58
Q

An early networking protocol from Microsoft

A

NetBIOS

59
Q

The set of standards defined by the network for clients attempting to access it

A

network access control (NAC)

60
Q

A server that acts as a go-between for clients accessing the Internet

A

Network Address Translation (NAT)

61
Q

The protocol Point-to-Point Protocol (PPP) employs for encapsulating network traffic

A

Network Control Protocol (NCP)

62
Q

An intrusion prevention system that is network based

A

network intrusion prevention system (NIPS)

63
Q

Another term for MAC filtering

A

network lock

64
Q

An approach to an intrusion detection system (IDS) - it attaches the system to a point in the network where it can monitor and report on all network traffic

A

network-based IDS (NIDS)

65
Q

Penetration/vulnerability testing that takes a passive approach rather than actually trying to break into the network

A

nonintrusive tests

66
Q

Making sure the sender can’t repudiate (dispute) sending the data

A

nonrepudiation

67
Q

A database that is not a relational database and does not use SQL

A

NoSQL database

68
Q

Storing data off the premise - usually in a secure location

A

offsite storage

69
Q

An antenna type that receives a signal from all directions

A

omnidirectional

70
Q

A database model in which the database and the application exist on a single system

A

one-tier model

71
Q

A type of encryption in which plain text is paired with secret keys and then encrypted

A

one-time pad

72
Q

A real-time protocol that replaces CRLs to immediately verify a certificate’s authenticity

A

Online Certificate Status Protocol (OCSP

73
Q

Storing backup data at the same site as the servers on which the original data resides

A

onsite storage

74
Q

A firewall technology that accepts or rejects packets based on their content

A

packet filtering

75
Q

The process of looking through message packets to find data

A

packet sniffing

76
Q

The computation of parity for a given set of data

A

parity information

77
Q

The correct method of extinguishing a fire with an extinguisher: pull - aim - squeeze and sweep

A

PASS method

78
Q

A nonactive response - such as logging

A

passive response

79
Q

Attempting to ascertain a password that you should not know

A

password attacks

80
Q

A fix for a known software problem

A

patch

81
Q

Password-Based Key Derivation Function 2 applies some function (like a hash or HMAC) to the password or passphrase along with Salt to produce a derived key

A

PBKDF2

82
Q

Security set up on the outside of the network or server to protect it

A

perimeter security

83
Q

Card required of federal employees and contractors to gain access (physical and logical) to government resources

A

Personal Identity Verification (PIV)

84
Q

Information that can be uniquely used to identify - contact - or locate a single person

A

personally identifiable information (PII)

85
Q

A virus that modifies and alters other programs and databases

A

phage virus

86
Q

A form of redirection in which traffic intended for one host is sent to another

A

pharming

87
Q

A form of social engineering in which you simply ask someone for a piece of information that you are missing by making it look as if it is a legitimate request

A

phishing

88
Q

A large Internet Control Message Protocol (ICMP) packet sent to overflow the remote host’s bugger

A

ping of death

89
Q

Standard telephone service - as opposed to other connection technologies like Digital Subscriber Line (DSL)

A

plain-old telephone service (POTS)

90
Q

A cloud service model wherein the consumer can deploy but does not manage or control any of the underlying cloud infrastructure

A

Platform as a Service (PaaS)

91
Q

When portable data storage devices (such as an iPod) are plugged directly into a machine and used to bypass the network security measures and illicitly download confidential information

A

pod slurping

92
Q

A full-duplex line protocol that supersedes Serial Line Internet Protocol (SLIP) Its part of the standard TCP/IP suite and is often used in dial-up connections

A

Point-to-Point Protocol (PPP)

93
Q

An extension to Point-to-Point Protocol (PPP) that is used in virtual private networks (VPNs) An Alternative to PPTP is L2TP

A

Point-to-Point Tunneling Protocol (PPTP)

94
Q

Rules or standards governing usage

A

policies

95
Q

An attribute of some viruses that allows them to mutate and appear differently each time they crop up

A

polymorphic

96
Q

A means of translating between ports on a public and private network

A

Port Address Translation (PAT)

97
Q

Scanning a server for open ports that can be taken advantage of by sending messages to ports to see which ones are available and which ones arent

A

port scanning

98
Q

Connections available within TCP/IP

A

ports

99
Q

An email access program that can be used to retrieve email from an email server

A

Post Office Protocol (POP)

100
Q

The protocol used to download email from an SMTP email server to a network client

A

Post Office Protocol Version 3 (POP3)