Chapter 11 Terms Flashcards

1
Q

SSH

A

A connection utility that provides authentication and encryption while logging on to a host, executing commands on that host, and copying files to or from that host. Uses Port 22.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Honeypot

A

A decoy system isolated for legitimate systems and designed to be vulnerable to security exploits for the purpose of learning more about hacking techniques or nabbing a hacker in the act.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

IPS

A

A dedicated device or software running on a host that automatically reacts to any unauthorized attempt to access an organization’s secured resources on a network or host. It is often combined with IDS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

IDS

A

A dedicated device or software running on a host that monitors, flags, and logs any unauthorized attempt to access an organization’s secured resources on a network or host.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

ACL

A

A list of statements used by a router to permit or deny the forwarding of traffic on a network based on one or more criteria.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Kerberos

A

A network authentication protocol which works on the basis of “tickets” to allow nodes communicating over a non-secure network to prove their identity to one another. Its designers aimed primarily at a client–server model, and it provides mutual authentication—both the user and the server verify each other’s identity. Uses Port 88.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

AES

A

A private key encryption algorithm that weaves keys of 128, 160, 192, or 256 bits through data multiple times.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

DoS attack

A

A security attack in which a system becomes unable to function because it has been inundated with requests for services and can’t respond to any of them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

HTTP

A

A set of rules for transferring files (text, graphic images, sound, video, and other multimedia files) on the World Wide Web. Uses Port 80.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Asymmetric encryption

A

A type of encryption (such as public key encryption) that uses a different key for encoding data than is used for decoding the ciphertext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

brute force attack

A

An attempt to discover an encryption key or password by trying numerous possible character combinations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

CHAP

A

An authentication protocol that operates over PPP and requires the authenticator to take the first step by offering the other computer a challenge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

CA

A

An organization that issues and maintains digital certificates as part of the Public-key Infrastructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

IPSec

A

Defines encryption, authentication, and key management for TCP/IP transmissions. It is an enhancement for IPv4 and is native to IPv6.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ESP

A

In IPSec, this is a type of encryption that provides authentication of the IP packet’s data payload through the public key technique. It also encrypts the entire IP packet for added security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

802.11i

A

The IEEE standard for wireless network encryption and authentication that uses the EAP authentication method, strong encryption, and dynamically assigned keys. This specifies AES encryption and weaves a key into each packet. Uses 802.1x and TKIP

17
Q

3DES

A

The modern implementation of the data encryption standard which weaves a 56-bit key through data three times, each time using a different key.

18
Q

DMZ

A

The perimeter of a protected internal network where users, both authorized and unauthorized, from external networks can attempt to access it.

19
Q

HTTPS

A

The URL prefix that indicates that a Web page requires its data to be exchanged between client and server using SSL encryption. It uses TCP Port 443.

20
Q

Encryption

A

The use of an algorithm to scramble data into a format that can be read only by reversing the algorithm to keep the information private.

21
Q

EAP

A

This protocol specifies the dynamic distribution of encryption keys and a preauthorization process in which a client and server exchange data via an intermediate node. It can be used with multiple authentication and encryption schemes.

22
Q

Zero-day exploit

A

This takes advantage of a software vulnerability that hasn’t yet become public and is known only to the hacker who discovered it, so the harm is inflicted before the software developer has the opportunity to provide a solution for it.