Cards #101 - 150 Flashcards

1
Q

Cryptographic keys

A

used in encrypting and decrypting information, there are private keys and public keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cryptography

A

science of writing on a secret code and is an ancient art

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Cyber bullying

A

any online behavior that embarrasses or hurts feelings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

DAC (Discretionary Access Control)

A

a person has complete control over the object that it owns and the programs that it executes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Data driven attack

A

a form of attack that is encoded in seemingly innocuous data which is executed by a user or a process to implement an attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Data integrity

A

when automated data is the same as in the source documents (has not been exposed to alternation or destruction)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Digital signature

A

a way to verify that an email message is really from the person who supposedly sent it and that it hasn’t been changed (has a public key and a private key)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Deceiving

A

giving a false impression, lying

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Defense against IP spoofing

A

monitoring network for atypical activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Spoofing

A

type of cyber attack that is used by hackers to gain access to computers and mine them for sensitive data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Demilitarized some (DMZ)

A

hosts of DMZ are typically web servers, email servers, and the alike, and are accessible for both internal and external users (allow user on the Internet to access the servers without accessing the organization’s internal network)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Denial of Service (DoS)

A

prevents legitimate users from using a service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

DES-CBC

A

default cipher for the IPSec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Dial-Up

A

service whereby a computer terminal can use the telephone to initiate and effect communication with a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Dictionary attack

A

attack that uses brute-force technique of successively trying all the words in some large, exhaustive list

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Differential backup

A

backups any files that have been altered since the last full backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Direct action virus

A

a virus that takes instant action in your device usually spread by executable files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Directory Harvest Attack

A

an attempt to determine the valid e-mail addresses associated with an e-mail server so that they can be added to a spam database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Disasters can be categorized into tow broad categories :

A

Man-made and Electronic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Discretionary Access Control (DAC)

A

a means of restricting access to objects based on the identity of subjects and/or groups to which they belong

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Floppy Disks

A

highly vulnerable to damage by magnetic fields and the environment. unsuitable for storing and archiving data compared to today’s alternative removable media

22
Q

Distributed Denial of Service (DDoS)

A

when an attacker attacks from multiple source systems. Distributes trojan horses to PCs, zombies or slaves, an uses them to launch the attack

23
Q

Distributed Tool

A

tool that can be distributed to multiple hosts, which can then be coordinated to anonymously perform an attack on the target host simultaneously after some time delay

24
Q

Domain Name System (DNS) spoofing

A

assuming the DNS name of another system by either corrupting the name service cache of a victim system, or by compromising a domain name server for a valid domain

25
Q

DSL

A

Digital Subscriber Line Internet connectivity. provides the user with dedicated bandwidth

26
Q

Dumpster diving

A

going through trash bins to search for papers with employee and department names, administration codes, specifics about the companies network environment, and other useful information

27
Q

Dynamic NAT

A

the router maintains a list of internal addresses and a list of external addresses that are dynamically mapped to each otehr

28
Q

Email attachment

A

files sent with emails that may contain malware (may allow malicious code to enter a desktop)

29
Q

Email bombs

A

large quantity of bulk email that overwhelms an email server preventing user access

30
Q

Egress filters

A

ensures that packets with source address of the internal network cannot originate form a remote location

31
Q

Encryption

A

a process of encoding messages to keep them secret, so only “authorized” parties (with secret key or password) can read it

32
Q

EULA

A

End User License Agreement.

contract between you and the software’s vendor or developer.

33
Q

Exception policy

A

provides the ability to exclude applications and processes from detection by the virus and spyware scans and by SONAR

34
Q

Extranet

A

Similar to Intranet, but is accessible by two or more parties. When two companies/partners need to communicate and collaborate a lot, they connect their networks together. (like a sharepoint(?))

35
Q

Fails over

A

refers to the process of reconstructing a system or switching over to other systems when a failure is detected

36
Q

False Accept Rate

A

measures the likelihood that a user will claim a false identity and be accepted

37
Q

False Acceptance

A

where an unauthorized user is identified as an authorized user

38
Q

False Reject Rate

A

Measures the likelihood that a system will incorrectly deny the user

39
Q

Faraday Cage

A

can be used to prevent interferences and emissions

40
Q

Fast flux

A

DNS technique used by botnets to hide phasing and malware delivery sites behind an ever-changing network of comprised hosts acting as proxies

41
Q

FAT virus

A

ruin your file allocation system (can also destroy files and entire directories for them)

42
Q

Fault tolerance

A

primarily the ability of a system to sustain operations in the event of a component failure

43
Q

FDE

A

Full Disk Encryption.
Automatically converts data on a hard drive into a form that cannot be understood by anyone who does not have the decryption key

44
Q

Fiber Optics

A

allows for the longest distances and highest transmission speeds, and is the most secure type of network cabling

45
Q

File infector virus

A

a virus that attaches itself to executable files. when the infected executable files runs, the virus copies itself to memory. later the virus attaches itself to other executable files

46
Q

Firewall

A

part of a computer system that is designed to block unauthorized access

47
Q

Firewall analyzer

A

helps network security administrators and IT managers for bandwidth monitoring and Firewall Internet security events monitoring efficiently

48
Q

Firewall policy

A

an addition to security policy that describes how firewalls should handle application traffic (such as Web or email applications)

49
Q

Flooding

A

type of incident involving insertion of a large volume of data resulting in denial of service

50
Q

FTP

A

file transfer protocol.

used to upload or download files