B Flashcards

1
Q

backdoors

A

An opening left in a program application that allows additional access to data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Background check

A

a process designed to uncover any criminal activity or other past behavior that may indicate that a potential employer poses an undetected risk to the organization. 6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Badges

A

Forms of physical identification of electronic access control devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Behavior based detection

A

An intrusion discovery mechanism used by intrusion detection systems. Finds out about the normal activities and events on your system by watching and learning. 6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Biometrics

A

Widely available on modern devices, with fingerprints and facial recognition being the most broadly adopted and deployed. 6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Birthday Attack

A

This is an attack on cryptographic hashes, based on the birthday theory. 6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Blackmail attacks

A

Attacks seeking to export money or other concessions from victims by threating to release sensitive information or launching further attacks. 6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Blind content-based SQL injections

A

The perpetrator sends input to the web application that tests whether the application is interpreting injected code before attempting to carry out an attack. 6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Blind SQL injection

A

A kind of SQL injection attack that is conducted when the attacker does not have the ability to view the results directly. 6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Blind Timing Based SQL Injection

A

In addition to using the content returned by an application to assess susceptibility to blind SQL injection attacks, penetration testers may use the amount of time required to process as a query as a channel for retrieving information from a database. 6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Block Ciphers

A

Operate on “chunks” or blocks of a message and apply the encryption algorithm to an entire message block at the same time. 6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Block Storage

A

Allocates a large volume of storage from use by virtual server instances. 6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Business Continuity and Disaster Recovery

A

Outline the procedures and strategies to ensure that essential business functions continue to operate during and after a disaster, and that data and assets are recovered and protected. 8

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Business Partners Agreement (BPA)

A

Business Partners agreement (BPA) Exists when 2 organizations agree to do business with each other in a partnership. 8

How well did you know this?
1
Not at all
2
3
4
5
Perfectly