B(s) Flashcards

1
Q

Backdoor

A

A shortcut in a system that allows a user to bypass security checks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Background checks

A

Verification of a person’s background and experience, also called a pre-employment screening

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Backward chaining

A

Expert system mode that starts with begins with a premise, and works backwards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Baseband

A

Network with one channel; can only send one signal at a time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Baseline

A

Uniform ways to implement a safeguard,administrative control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Baselining

A

The process of capturing a point in time understanding of the current system security configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

BIOS

A

Basic Input Output System, typically stored in firmware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

BRI

A

Basic Rate Interface, provides two 64 K digital ISDN channels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Bastion host

A

Any host placed on the internet that is not protected by another device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Bayesian filtering

A

Uses mathematical formulas to assign probabilities to make decisions such as identifying spam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

BCI

A

The business continuity Institute

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

BCP

A

Business Continuity Plan. A long-term plan to ensure the continuity of business operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

BCP/DRP project manager

A

The key point of contact for ensuring that a BCP/DRP is not only completed, but also routinely tested

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Bell-LaPadula

A

Security model focused on maintaining the confidentiality of objects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Best evidence rule

A

Requires use of the strongest possible evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Best practice

A

A consensus of the best way to protect the confidentiality, integrity and availability of assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

BGP

A

Border Gateway Protocol, the routing protocol used on the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Biba

A

Security model focused on maintaining the integrity of of objects

19
Q

Big Bang testing

A

Integration testing that tests all integrated software components

20
Q

Binary image

A

Bit-level copy of memory

21
Q

Black box software testing

A

Gives the tester no internal details: the software is treated as a black box that receives inputs

22
Q

Black hat

A

Unethical hacker or researcher

23
Q

Blowfish

A

Block cipher using from 32 through 448 bit (the default is 128) keys to encrypt 64 bit of data

24
Q

Bluetooth

A

802.15 networking, a PAN wireless technology

25
Q

Bollard

A

A post designed to stop a car, typically deployed in front of building entrances

26
Q

Book cipher

A

Cryptographic method that uses whole words from a well-known text such as a dictionary as a one-to-one replacement for plaintext

27
Q

Boot sector virus

A

Virus that infects the boot sector of a PC, which ensures the virus loads upon system startup

28
Q

BOOTP

A

Bootstrap protocol, used for bootstrapping via a network by diskless systems

29
Q

Bot

A

A computer system running malware that is controlled via a botnet

30
Q

Botnet

A

A central bot command and control (C&C) Network, managed by humans called bot herders

31
Q

Bottom-Up programming

A

Starts with the low-level technical implementation details and works up to the concept of the complete program

32
Q

Breach notification

A

Notification of persons whose personal data has been, or is like to have been compromised

33
Q

Brewer-Nash

A

Or (Chinese wall model) model designed to avoid conflicts of interest by prohibiting one person, like a consultant, from accessing multiple conflict of interest categories (CoIs)

34
Q

Bridge

A

Layer 2 device that has two ports and connects network segments together

35
Q

Broadband

A

Network with multiple channels; can send multiple signals at a time, like cable TV

36
Q

Broadcast

A

Traffic that is sent to all stations in a LAN

37
Q

BRP

A

Business Recovery Plan, details the steps required to restore normal business operations after a recovering from a disruptive event. Also known as the Business Resumption Plan

38
Q

Brute force attack

A

Attack that attempts every possible key or combination

39
Q

BS-25999

A

Continuity standard by the British Standards Institute (BSI)

40
Q

Buffer overflow

A

Condition where an attacker can insert data beyond the end of a buffer variable

41
Q

Bus

A

Physical network topology that connects network nodes in a string

42
Q

Business interruption testing

A

Partial or complete failover to an alternate site

43
Q

Business Owners

A

Also called Mission Owners, members of senior management who create the information security program and ensure that is properly staffed, funded, and has organizational priority

44
Q

Bytecode

A

Machine-independent code, used by Java