700 Flashcards

1
Q

A notification that an unusual condition exists and should be investigated.

A

alert

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The series of steps/formula/process that is followed to arrive at a result.

A

algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The component or process that analyzes the data collected by the sensor.

A

analyzer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A calculation that is used to identify risks and calculate the expected loss each year.

A

annual loss expectancy (ALE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A calculation of how often a threat will occur.

A

annualized rate of occurrence (ARO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The act of looking for variations from normal operations (anomalies) and reacting to them.

A

anomaly detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Authentication that doesn’t require a user to provide a username - password - or any other identification before accessing resources.

A

anonymous authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A category of software that uses various methods to prevent and eliminate viruses in a computer.

A

antivirus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The core program that runs the virus-scanning process.

A

antivirus engine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Software that identifies the presence of a virus and is capable of removing or quarantining the virus.

A

antivirus software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A networking capability included with all Macintosh Computers.

A

AppleTalk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A freestanding device that operates in a largely self-contained manner.

A

appliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The seventh layer of the OSI model. This layer deals with how applications access the network and describes application functionality - such as file transfer - messaging - and so on.

A

Application layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

An abstract interface to the services and protocols provided by an operating system.

A

Application Programming Interface (API)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A virus that is protected in a way that makes disassembling it difficult.

A

armored virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Any resource of value.

A

asset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Any unauthorized intrusion into the normal operations of a computer or computer network.

A

attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Files that hold information about a resource’s access by users.

A

audit files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The act of tracking resource usage by users.

A

auditing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Individuals involved in auditing log and security files.

A

auditors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Verifying that the logs and other resources collected are legitimate.

A

authenticating the evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

The means of verifying that someone is who they say they are.

A

authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

The time period during which a resource can be accessed.

A

availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

An opening left in a program application (usually by the developer) that allows additional access to data.

A

backdoor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Originally created as a support tool - it is now well known as an illicit server program that can be used to gain access to Windows NT/2000 servers and take control.

A

Back Orifice

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

A copy of data made to removable media.

A

backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

A documented plan governing backup situations.

A

backup plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

A written policy detailing the frequency of backups and the location of storage media.

A

backup policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

A model designed for the military to address the storage and protection of classified information. The model prevents the user from accessing information that has a higher security rating than they are authorized to access. It also prevents information from being written to a lower level of security.

A

Bell La-Padula model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

A set of rules governing basic operations.

A

best practices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

A device that can authenticate an individual based on a physical characteristic.

A

biometric device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

The science of identifying a person by using one or more of their features. This can be a thumbprint - a retina scan - or any other biological trait.

A

biometrics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

A probability method of finding similar keys in MD5.

A

birthday attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

A type of symmetric block cipher created by Bruce Schneier.

A

Blowfish

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Also known as the Master Boot Record (MBR). The first sector of the hard disk - where the program that boots the operating system resides. It’s a popular target for viruses.

A

boot sector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

A protocol predominantly used by ISPs that allows routers to share information about routes with each other.

A

Border Gateway Protocol (BGP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

A router used to translate from LAN framing to WAN framing.

A

border router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

A type of attack that relies purely on trial and error.

A

brute force attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

A type of DoS attack that occurs when more data is put into a buffer than it can hold - thereby overflowing it (as the name implies.)

A

buffer overflow attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

A contingency plan that will allow a business to keep running in the event of a disruption to vital resources.

A

Business Continuity Planning (BCP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

A study of the possible impact if a disruption to a business’s vital resources were to occur.

A

Business Impact Analysis (BIA)

42
Q

A type of symmetric block cipher defines by RFC 2144.

A

Carlisle Adams Stafford Tavares (CAST)

43
Q

The primary office from which most resources extend.

A

central office

44
Q

A digital entity that establishes who you are and is often used with e-commerce

A

certificate

45
Q

An issuer of digital certificates (which are then used for digital signatures or key pairs.)

A

certificate authority (CA)

46
Q

Policies governing the use of certificates

A

certificate policies

47
Q

The principles and procedures employed in the issuing and managing of certifications.

A

Certificate Practice Statement (CPS)

48
Q

The act of making a certificate invalid.

A

certificate revocation

49
Q

A list of digital certificate revocations that must be regularly downloaded to stay current.

A

Certificate Revocation List (CRL)

50
Q

The log of the history of evidence that has been collected.

A

chain of custody

51
Q

A protocol that challenges a system to verify identity.

A

Challenge Handshake Authentication Protocol (CHAP)

52
Q

Documentation required to make a change in the scope of any particular item.

A

change documentation

53
Q

A certain action or moment in time that is used to perform a check. It allows a restart to begin at the last point the data was saved as opposed to from the beginning.

A

checkpoint

54
Q

A hexadecimal value computed from transmitted data that is used in error-checking routines.

A

checksum

55
Q

A switching method where a dedicated connection between the sender and receiver is maintained throughout the conversation.

A

circuit switching

56
Q

An integrity model for creating a secure architecture.

A

Clark-Wilson model

57
Q

Unencrypted text that can be read with any editor.

A

cleartext

58
Q

The part of a client/server network where the computing is usually done. In a typical setting - a client uses the server for remote storage - backups - or security (such as a firewall).

A

client

59
Q

A server-centric network in which all resources are stored on a file server and processing power is distributed among workstations and the file server.

A

client/server network

60
Q

An early encryption system offered by the NSA for civilian use that was a hardware implementation of the skipjack encryption algorithm.

A

clipper chip

61
Q

A method of balancing loads and providing fault tolerance.

A

clustering

62
Q

A type of cabling used in computer networks

A

coax

63
Q

The storage and conditions for release of source code provided by a vendor - partner - or other party.

A

code escrow

64
Q

A physical site that has all the resources necessary to enable an organization to use it if the main site is inaccessible (destroyed).

A

cold site

65
Q

The means and orderly fashion by which evidence is collected - identified - and marked.

A

collection of evidence

66
Q

An agreement between individuals to commit fraud or deceit.

A

collusion

67
Q

A document of specifications detailing security evaluation methods for IT products and systems.

A

Common Criteria (CC)

68
Q

A set of standards - formerly known as the Mutual Recognition Agreement (MRA) - the define Evaluation Assurance Levels (EALs).

A

Common Criteria Recognition Agreement (CCRA)

69
Q

An older form of scripting that was used extensively in early web systems.

A

Common Gateway Interface (CGI)

70
Q

A virus that creates a new program that runs in place of an expected program of the same name.

A

companion virus

71
Q

Standards that support a non-hierarchical security classification.

A

compartmentalization

72
Q

The act of assuring that data remains private and no one sees it except for those expected to see it.

A

confidentiality

73
Q

The administration of setup and changes to configuration.

A

configuration management

74
Q

Communications between two hosts that have no previous session established for synchronizing sent data.

A

connectionless

75
Q

Communications between two hosts that have a previous session established for synchronizing sent data.

A

connection-oriented

76
Q

A plain-text file stored on your machine that contains information about you (and your preferences) for use by a database server.

A

cookie

77
Q

Functions on which the livelihood of the company depends.

A

critical business functions

78
Q

The study and practice of finding weaknesses in ciphers.

A

cryptanalysis

79
Q

A person who does cryptanalysis.

A

cryptanalyst

80
Q

A person who participates in the study of cryptographic algorithms.

A

cryptographer

81
Q

A symmetric algorithm - also known as a cipher - used to encrypt and decrypt data.

A

cryptographic algorithm

82
Q

The field of mathematics focused on encrypting and decrypting data.

A

cryptography

83
Q

An individual responsible for maintaining the data - and the integrity of it - within their area.

A

custodian

84
Q

An error-checking method in data communications that runs a formula against data before transmission.

A

cyclical redundancy check (CRC)

85
Q

A level of confidence that data won’t be jeopardized and will be kept secure.

A

data integrity

86
Q

The second layer of the OSI model. It describes the physical topology of a network.

A

Data Link layer

87
Q

A unit of data sent over a network. A packet includes a header - addressing information - and the data itself.

A

data packet

88
Q

A centralized storage location for data - such as a database.

A

data repository

89
Q

Where data originates.

A

data source

90
Q

A Layer 3 packet descriptor.

A

datagram

91
Q

The process of converting encrypted data back into its original form.

A

decryption

92
Q

The router to which all packets are sent when the workstation doesn’t know where the destination station is or when it can’t find the destination station on the local segment.

A

default gateway

93
Q

A method of placing web and other servers that serve the general public outside the firewall and - therefore - isolating them from internal network access.

A

demilitarized zone (DMZ)

94
Q

A type of attack that prevents any users–even legitimate ones–from using the system.

A

Denial of Service (DoS) attack

95
Q

A portion of a complete address of the PC to which data is being sent from a sending PC. The port portion allows for the demultiplexing of data to be sent to a specific application.

A

destination port number

96
Q

The act of noticing an irregularity as it occurs.

A

detection

97
Q

An attack that uses words from a database (dictionary) to test against passwords until a match is found.

A

dictionary attack

98
Q

A type of backup that includes only new files or files that have changed since the last full backup.

A

differential backup

99
Q

This cryptographic algorithm is used primarily to send secret keys across public networks. The process isn’t used to encrypt or decrypt messages; it’s used merely for the transmission of keys in a secure manner.

A

Diffie-Hellman

100
Q

An electronic signature whose sole purpose is to authenticate the sender.

A

digital signature