Chapter 7 Security Key Terms Flashcards

1
Q

mantrap

A

An area with two locking doors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Radio-frequency identification (RFID) technology

A

a technology that consists of an RFID tag that can broadcast information about an item, as well as an RFID reader to accept the broadcast information and deliver it to a computer system for use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

smart card

A

A credit card–sized card that contains stored information and might also contain a simple microprocessor or an RFID chip

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

biometric security

A

The use of a person’s biological information, such as fingerprints, retina scans, or facial recognition, to authenticate a potential user of a secure area.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

token

A

A device, also known as a security token, that owners carry to authorize access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

cable lock

A

A lock that uses a multistranded security cable to help prevent the theft
of a computer or another technology device. Sometimes called a Kensington lock. A lock that uses a multistranded security cable to help prevent the theft of a computer or another technology device. Sometimes called a Kensington lock.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

USB lock

A

A lock used to secure USB cables into a computer and to securely plug empty USB ports.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

privacy screen

A

A screen placed over a monitor to limit visibility for people standing nearby

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

key fob

A

A type of security token that generates access codes for authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

entry control roster

A

A list of individuals or representatives who are authorized to enter a secured area that can be used with a variety of security systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Active Directory Service

A

A Microsoft solution for managing users, computers,

and information access in a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

login script

A

A script that Active Directory runs to make assigned resources available to a user who logs on to a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

domain

A

A computer network or group of computer networks under the same
administration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Group Policy

A

A set of rules and instructions defining what a user or group of users
can or cannot do when logged into a domain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Organizational Unit (OU)

A

A logical group that can be used to organize users and

computers so that Group Policy Objects (GPOs) can be assigned to them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

home folder

A

A file in which a user’s data and files are kept locally but are accessible to the network administrator.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

folder redirection

A

A process that allows for the work done by an Organizational Unit (OU) to be saved on a common folder in the domain, as directed by the administrator instead of the user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

software token

A

Software security information used for authentication; generally
stored on a device. Can be generated by an app such as Google Authenticator.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

mobile device management (MDM)

A

A way to manage the mobile devices within
an enterprise. For example, can ensure that all mobile users on the network have
updated security files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

MAC address

A

Sometimes known as a physical address, a unique identification address for any device that has a network adapter and that consists of six two-digit hexadecimal numbers. For example, a typical PC MAC address is
FA-15-B7-89-6C-24.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

whitelisting

A

The practice of providing network access to only certain devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

MAC address filtering

A

A method of securing networks by allowing only devices with known MAC addresses into the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

MAC address cloning

A

The process of using software to change the MAC address of a network device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

certificate

A

A means of identifying a software publisher to ensure that it is
legitimate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

antivirus/anti-malware software

A

Software designed to thwart virus and malware

attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

firewall

A

A hardware appliance or software application that protects a computer
from unwanted intrusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

two-way firewall

A

A firewall that can be used to protect against both inbound and outbound unauthorized traffic and threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

authentication

A

The process of verifying user identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

multifactor authentication

A

A security system that uses two or more authentication methods and is far more secure than single-factor authentication. An example
of this would be a person using a digital code from a fob and typing a username and password to gain access to a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

directory permissions

A

A term used in macOS and Linux for the access levels a user has to a directory (folder) and individual files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

file and folder permissions

A

A term used in Windows systems for configuring a

user’s access levels to a directory (folder) and individual files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

virtual private network (VPN)

A

A private and secure network connection that is

carried by an insecure public network, such as the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

data loss/leakage prevention (DLP)

A

The process of preventing confidential information from being viewed or stolen by unauthorized parties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

access control list

A

A list of permissions or restriction rules for access to an object such as a file or folder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

email filtering

A

A method used to organize email into folders automatically. From
a security standpoint, the most important function is the blocking of spam and
potentially dangerous messages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

principle of least privilege

A

A security method whereby a user should have access

only to what is required to do his or her job and no more.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Wired Equivalent Privacy (WEP)

A

the oldest and weakest WiFi encryption standard. With WEP, all network devices must use the same WEP key and encryption
strength.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

WiFi Protected Access (WPA)

A

A security standard for WiFi networks that replaced WEP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Temporal Key Integrity Protocol (TKIP)

A

A security protocol used in the WPA wireless networking standard.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Advanced Encryption Standard (AES)

A

A protocol that is similar to TKIP but more secure and that is used with the WPA2 wireless encryption standard.

41
Q

single-factor authentication

A

Basic username and password access to a computer or network.

42
Q

multifactor authentication

A

A security system that uses two or more authentication methods and is far more secure than single-factor authentication. An example
of this would be a person using a digital code from a fob and typing a username and password to gain access to a system.

43
Q

Remote Authentication Dial-In User Service (RADIUS)

A

Software and a protocol that allows remote authentication via a central server.

44
Q

Terminal Access Controller Access Control System (TACACS)

A

An authentication protocol that allows a remote access server to verify a user by communicating
with an authentication server.

45
Q

ransomware

A

A virus that takes over a computer or network until a ransom is paid

46
Q

Trojan

A

A malware program disguised as a “gift” (such as a popular video or website link) in order to trick the user into downloading the virus

47
Q

keylogger

A

A hardware device or a software program (often a virus) that can track
keystrokes and can capture usernames and passwords of unwitting users

48
Q

rootkit

A

A set of hacking tools that finds its way deep into a computer’s operating
system or applications and sets up shop to take over the computer

49
Q

virus

A

A generic term for any malicious software that can spread to other computers and cause trouble

50
Q

botnet

A

A network of computers infected by a hacker virus that uses the infected
machines to work together to cause trouble, such as sending denial of service attacks or spreading spam

51
Q

worm

A

A type of virus that is able to self-replicate on computers and push itself out
to other computers.

52
Q

spyware

A

Software that spies on system activities and transmits details of web
searches or other activities to remote computers.

53
Q

Recovery Console

A

A Windows tool that allows a user to reset a PC or boot from a recovery disk

54
Q

acceptable use policy (AUP)

A

A company’s policy for employees pertaining to
user safety, security procedures, and computer best practices within a company. The policy is designed to keep the network safe.

55
Q

Domain Name Service (DNS)

A

a service that translates domain names into IP

addresses. DNS uses port 53

56
Q

social engineering

A

A type of attack in which hackers trick users into providing passwords or other sensitive information.

57
Q

phishing

A

The process of creating bogus websites or sending fraudulent emails in
an attempt to trick users into providing personal, bank, or credit card information

58
Q

spear phishing

A

The process of sending spoof messages that appear to come from an internal source requesting confidential information, such as payroll or tax information

59
Q

impersonation

A

A type of social engineering similar to phishing in which a hacker
sends an email pretending to be someone the victim trusts.

60
Q

shoulder surfing

A

Attempting to view physical documents on a user’s desk or electronic documents displayed on a monitor by looking over the user’s shoulder

61
Q

tailgating

A

A process in which an unauthorized person attempts to accompany an
authorized person into a secure area by following closely and grabbing the door before it shuts

62
Q

dumpster diving

A

The process of going through the trash, seeking information about a network or a person with access to the network.

63
Q

denial of service (DoS)

A

the perpetrator uses one or computer to disrupt the target computer’s access to the Internet

64
Q

distributed denial of service (DDoS)

A

the perpetrator uses multiple computers to disrupt the target computer’s access to the Internet

65
Q

zero day

A

A cyber threat described as the time between when a software vulnerability is discovered and when a patch is issued by the developers. Hackers may exploit this window

66
Q

man-in-the-middle (MiTM)

A

An attack in which the attacker intercepts a connection while fooling the endpoints into thinking they are communicating directly
with each other.

67
Q

brute force attack

A

A method of cracking passwords by calculating and using every possible combination of characters until the correct password is discovered

68
Q

dictionary attack

A

An attempt to crack passwords by trying all the words in a list,
such as a dictionary. A simple list might include commonly used passwords such as 12345678 and password

69
Q

rainbow table

A

A table that is used in an attack in much the same manner as a brute-force attack but that is more mathematically sophisticated and takes less time

70
Q

spoofing

A

A general term for malware attacks that purport to come from a trustworthy source.

71
Q

noncompliant systems

A

Systems that are tagged by a configuration manager application (for example, Microsoft’s System Center Configuration Manager) for not having the most up-to-date security patches installed.

72
Q

zombie

A

A computer on the Internet that has been taken over by a hostile program
so it can be used for malware distribution or distributed denial of service (DDoS) or other attacks without notification to the normal users of the computer.

73
Q

access control

A

The process of restricting the level of access to files or folders on an individual user basis.

74
Q

New Technology File System (NTFS)

A

the native secure file

system of Windows 7/8/8.1/10

75
Q

file attributes

A

Data used in Windows to indicate how files can be treated. Can be used to specify which files should be backed up, which should be hidden from the normal GUI or command line file listings, whether a file is compressed or encrypted, and for other functions, depending upon the operating system.

76
Q

local shares

A

Files or folders shared locally in Windows.

77
Q

administrative shares

A

Files or folders shared across networks in Windows

78
Q

system files and folders

A

Files and folders with the system(s) attribute that are

normally not displayed in File Explorer to help protect them from deletion.

79
Q

Single Sign-on (SSO)

A

The use of a single password to authenticate to multiple apps in an organization requiring authentication

80
Q

BitLocker

A

Full disk encryption software by Microsoft that can encrypt the entire
disk, which, after completed, is transparent to the user

81
Q

Trusted Platform Module (TPM)

A

A chip used by Windows editions that support the BitLocker full-disk encryption feature to protect the contents of any specified drive (Windows 7/8/8.1/10).

82
Q

BitLocker To Go

A

BitLocker functionality extended to removable drives.

83
Q

Encrypting File System (EFS)

A

A feature used to protect sensitive data files and

temporary files through encryption that can be applied to individual files or folders.

84
Q

passcode locking

A

The process of setting a passcode that opens a locked screen.

85
Q

remote wipe

A

A program that can be initiated from a desktop computer to delete
all the contents of a remote mobile device that has been lost or stolen

86
Q

locator application

A

An application/service such as Android Device Manager,
Lookout for iOS or Android, or Find My iPhone, that a user can use track down a
lost device.

87
Q

remote backup application

A

An application, often provided as a service, that backs up data to a remote site (often the cloud) to provide duplication away from the network servers.

88
Q

patching/OS updates

A

Updates that protect mobile devices from the latest vulnerabilities and threats. By default, the user is notified automatically about available updates on Android and iOS-based devices.

89
Q

biometric authentication

A

The use of physical biological identification, usually fingerprints, retina, or facial recognition, as part of the authentication process.

90
Q

full device encryption

A

The process of encrypting an entire device, as opposed to encrypting a file on a device

91
Q

authenticator application

A

An application used to receive or generate authentication codes for one or more apps or services.

92
Q

bring your own device (BYOD)

A

A policy that allows users to join the local network using their personal devices.

93
Q

overwrite

A

A disk maintenance program that includes options to overwrite a hard
disk’s or solid-state drives (SSD’s) data area with zeros.

94
Q

drive wipe

A

The process of ensuring the complete destruction of retrievable data
on a storage device, which is overwritten with a program that meets or exceeds recognized data-destruction standards

95
Q

service set identifier (SSID)

A

The advertised name of a local network that is
broadcast to potential users in range and enables users to find and join the local
(usually wireless) network.

96
Q

Default service set identifier (SSID)

A

the SSID on the router when shipped to customers. Best security practices include changing the default SSID and
password

97
Q

Network Address Translation (NAT)

A

the process of modifying IP addresses as information crosses a router.

98
Q

port forwarding

A

A method of allowing inbound traffic on a particular TCP or
UDP port or range to go to a particular IP address rather than to all devices on a network. Used to forward external visitors through the router to a specific computer. Instead of opening up the entire LAN, port forwarding directs particular traffic where you want it to go