Chapter 7: Security Flashcards

1
Q

DES

A

data encryption standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

HVAC

A

heating, ventilation, and air conditioning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

IDF

A

intermediate distribution frame

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

L2TP

A

Layer 2 tunneling protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

MDF

A

main distribution frame

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

MAC

A

media access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

NAS

A

network attached storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

PGP

A

pretty good privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

RDC

A

remote desktop connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

SSH

A

secure shell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

SSL

A

secure socket layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

SAN

A

storage area network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

3DES

A

triple data encryption standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

antispyware

A

A program designed to prevent spyware from being installed on a computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

badge

A

A card with a magnetic strip or chip that identifies the person assigned to the card.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

biometric scanner

A

A device used to identify a person based on biological data.

17
Q

data encryption standard (DES)

A

An outdated block cipher that uses a 64-bit cipher block and a 56-bit key.

18
Q

heating, ventilation, and air conditioning (HVAC) unit

A

Equipment designed to regulate temperature and humidity.

19
Q

intermediate distribution frame (IDF)

A

A cable rack that connects and manages wiring used for telecommunication between the MDF and devices such as computers or network printers. IDFs are usually found on each floor of a building in a data closet.

20
Q

key fob

A

A device synched with a network authentication service that provides a code used to log in to a network or other system

21
Q

Layer 2 tunneling protocol (L2TP)

A

A fully encrypted tunneling protocol used to create a VPN connection

22
Q

main distribution frame (MDF)

A

A cable rack that connects and manages wiring used for telecommunication between a service provider and intermediate distribution frames (IDFs). The MDF connects private or public lines coming into a facility with the networking devices in the facility.

23
Q

malicious software

A

Any program unknowingly transmitted to a computer or network designed to cause damage. Also called malware

24
Q

malware

A

See malicious software.

25
Q

media access control (MAC) filtering

A

The method to secure a network by limiting which devices are allowed to connect to a network based on a list of MAC addresses kept by the wireless access points.

26
Q

network attached storage (NAS)

A

A storage device connected directly to the network

27
Q

phishing

A

A form of social engineering in which an attacker tricks or manipulates a user to give out sensitive data or into allowing unauthorized programs onto the computer or network.

28
Q

pretty good privacy (PGP)

A

An encryption method designed for signing and encrypting e-mail, which uses both symmetric and asymmetric encryption.

29
Q

remote desktop connection (RDC)

A

A remote connection used to view another computer’s desktop in a window. RDC was created by Microsoft.

30
Q

secure shell (SSH)

A

An encrypted tunneling protocol used by client/server applications to connect a remote client to a server. The protocol is designed to ensure confidentiality and integrity of data over an unsecured network.

31
Q

secure socket layer (SSL)

A

A handshake between a web server and a browser to establish a secure connection.

32
Q

spam

A

Unsolicited contact that you did not ask for and don’t want and might come from an attacker.

33
Q

social engineering

A

A malicious attack using social skills directed at a person who has access to sensitive data.

34
Q

spyware

A

A type of malware designed to secretly collect information on a computer or network.

35
Q

storage area network (SAN)

A

An independent network separate from the normal LAN designed for data storage.

36
Q

terminal emulator

A

A connection to a mainframe computer that holds all the data being accessed. A terminal emulator typically looks like a command prompt window.

37
Q

triple data encryption standard (3DES)

A

An encryption similar to DES but uses a key that can be three times the size, at a 168-bit key.