Cards #151 - 200 Flashcards

1
Q

Full backup

A

complete, comprehensive backups of all files on a disk of server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Gateway

A

a bridge between two network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Hacker

A

unauthorized user who attempts to or gains access to an information system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Harassing

A

subject to aggressive pressure or intimidation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Hardware security

A

can be composed of adding cable locks to computers o prevent thieves from walking out with copies of customer database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Hash function

A

use one key for encryption and another for decrypting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Honeypot

A

computer system on the internet that is expressly set up to attract and “trap” intruders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Host integrity

A

the ability to define, enforce, and restore the security of client computers to keep enterprise networks and data secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Host-based IDS

A

a software application installed on a system and monitors activity only on the local system (rely on information from audit and system log files to detect intrusion)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Hot site

A

up and operational 24/7 and would be able to take over functionally form a primary site within minutes of a primary site failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How does NAT server help protect your network?

A

masking the IP addresses of internal computers from the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How does spyware differ from other forms of malware, such as worms and viruses

A

Not all spyware is malicious

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

HTTP

A

Hyper-Text Transfer Protocol. Used for websites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

HTTPS

A

Hyper-Text Transfer Protocol over Secure Socket Layer. authentication of the server, the data transmitted over a HTTPS connection is encrypted and confidential

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ICMP

A

Internet Control Message Protocol. used by a router to exchange information with other routers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Identification

A

identifying a person

17
Q

Implicit deny

A

indicates that unless something is specifically allowed, it is denied

18
Q

Bottleneck route

A

a network route that goes nowhere

19
Q

RAID 1

A

data written identically to two drives, therefore producing a mirrored set

20
Q

Incremental Backup

A

partial backup that stores only the info that has changed since the last full or incremental backup

21
Q

Ingress filters

A

ensures that only packets with a valid source address from the originating network are allowed to pass

22
Q

Instant Message

A

common communication using a computer. Opens listening ports on the computer, hence makes it vulnerable to network attacks and software exploits.

23
Q

Internet

A

a global network connecting millions of computers; has more than 200 million users worldwide, and that number if growing rapidly

24
Q

In-Private Filtering

A

filter potential unsafe websites you browse

25
Q

Internet Key Exchange (IKE) protocol

A

Standard key exchange protocol for IPSec. COnsists of the Internet Security Association and Key Management Protocol

26
Q

ISAKMP

A

Internet Security Association and Key Management Protocol. defines the procedures for peer authentication, the SA handshake process, and algorithms and key sizes

27
Q

Intranet

A

A small private piece of ‘Internet’ that is accessible only to users within the organization.

28
Q

Intrusion

A

Unauthorized act of bypassing the security mechanisms of a system

29
Q

Intrusion Detection System (IDS)

A

monitors and analyzes traffic on a network or activity on a system in an attempt to detect malicious activity. Logs the event, stores relevant data/traffic, notifies an administrator, an din some cases it will try to intervene

30
Q

Intrusion prevention policy

A

automatically detects and blocks network attacks and attacks on browsers as well as protects applications from vulnerabilities

31
Q

IP

A

Internet Protocol. The main delivery system for information over the Internet

32
Q

IP Addresses

A

a unique address that identifies a device on the internet or a local network

33
Q

IPSec

A

Internet Protocol Security. A popular and complete encryption framework for IP networks that provides end-to end security at the Network layer. It provides data confidentiality, data integrity, and authentication of data origin

34
Q

ISP

A

Internet Service Provider. a company that provides individuals and other companies access to the internet and other related services

35
Q

Java

A

an object-oriented programming language developed by Sun Microsystems. It is platform-independent, which makes it suitable for writing Internet application