Card #1 - 50 Flashcards

1
Q

Grayware

A

not classified as viruses but can harm the performance of computers on your network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cisco PIX

A

helps network security administrators and IT managers for bandwidth monitoring, and Firewall internet security events monitoring efficiently

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Spamtrap

A

a DNS technique used by botnets to hide phising and malware delivery sites behind an ever-changing network of compromised hots acting as proxies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Non-repudiation

A

provides definitive proof of a sender’s identity and can be used to prevent a party from denying that they took a specific action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Authentication

A

proving the person is who they say they are

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Data Recovery

A

salvaging data from damaged, failed, corrupted, or inaccessible secondary storage media the not CANNOT be accessed normally

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Timing

A

process of verifying a user’s identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Networking

A

science of writing in secret code and is an ancient art

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Secret Key Cryptography (SKC)

A

use for privacy and confidentiality. One key for encryption and another for decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Botnets

A

number of hijacked Internet-connected devices, each of which runs one or more bots, remotely controlled by hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

3 Factors of Authentication

A
  1. Something you know (username/password)
  2. Something you have (smart cards)
  3. Something you are (fingerprint, biometrics)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Data Warehouse

A

a duplicate of some or all of the main database’s data stored on a separate computer from the main database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Cold Site

A

least expensive type of backup site for an organization to operate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Risk mitigation controls to ensure employee safety

A

Emergency lighting, drills, escape plans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A denial service attack has occurred. Which questions should be answered during the incident identification phase?

A

What servers have been compromised?

AND

What is the impact to the business?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Public Key Cryptography

A

a pair of keys to encrypt and decrypt data to protect it against unauthorized access or use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Surge

A

a prolong increase in the voltage level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

sandbox

A

a security mechanism for separating running programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Authorization

A

a security system validates whether or not a user has permission to complete an action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Exception Handling

A

implements into application to respond more appropriately to errors and generate an error message when they occur.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Algorithm

A

a set of instructions normally implemented on a computer system as a procedure to manipulate data

22
Q

Spim

A

spam sent over instant message

23
Q

AAA

A

Authentication, Authorization, and Accounting

24
Q

Access control

A

a security measure that defines who can access a computer, device, or network, when they can access it, and what actions they can take while accessing it

25
Q

Access Creep

A

slow accumulation of unnecessary permissions, access rights, and outright privileges by individual users

26
Q

Internal Employee

A

What causes most information security breaches

27
Q

Active Response IDS

A

Automatically taking action in response to a detected intrusion

28
Q

ActiveX

A

A Microsoft technology that allows reusable software components to interact with each other in networks. Popular with viruses, Trojan Horses, spyware, and other malicious code due to lack of security.

29
Q

ActiveX controls

A

used to add Windows functionality and interactivity to web pages.

30
Q

Address Resolution Protocol (ARP)

A

A protocol form the TCP/IP suite that is used to discover the MAC address of a destination IP address

31
Q

Adware

A

Any software application that displays advertisement banners while the program’s running
Software that automatically displays or downloads advertising material (often unwanted) when a user is online

32
Q

Alert

A

notification that a specific attack has been directed at the information system of an organization

33
Q

Full Disk Encryption

A

Type of data encryption most often uses keys generated from the TPM

34
Q

Public Key Infrastructure (PKI)

A

combination of software, encryption technologies, and services that enables entities to protect the security of their communications and business transactions on networks

35
Q

TOTP (Time-based One-time Password Algorithm)

A

provides one-time password in an application that needs a two-factor authentication

36
Q

Fingerprint

A

unique to all individuals

37
Q

Integrity

A

implemented to verity that data has not been modified, tampered, or corrupted

38
Q

What does the recipient need to decrypt the message?

A

the recipient’s private key

39
Q

Anonymous access

A

user will be able to login without providing a password, or by using any email address as the password

40
Q

Antivirus software

A

a class of programs that searches your hard drive and floppy disks for any known or potential viruses

41
Q

Application and device control

A

protects the system’s resources form applications and manages the peripheral devices that can attach to computers

42
Q

Application backdoor

A

hidden access that provides some level of control of the program

43
Q

Application layer firewalls

A

Inspects traffic all the way up to layer 7 of the OSI model.

44
Q

Armored Viruses

A

designed to be difficult to detect and remove

45
Q

ARP spoofing

A

forging a MAC address in ARP messages

46
Q

Asset identification

A

first step towards a secure organization. identifying what you need to protect

47
Q

Asymmetric Key

A

algorithms are used to create a mathematically related key pair (a secret private key and a published public key

48
Q

Attack

A

intentional act of attempting to bypass one or more computer security controls

49
Q

Attributable data should be :

A

always traced to individuals responsible for observing and recovering the data

50
Q

Audit Trail

A

a record showing who has accessed a computer system and what operations he or she has performed during a given period of time (for maintaining security and for recovering lost transactions)