Comptia App Flashcards
/etc/shadow file for Linux
Contain passwords and is a popular target for brute force attacks
Air Gap
Physical Separation that will require manual transport of files, patches, and other data between 2 environments. Security measure that involves physically isolating a computer or network and preventing it from establishing an external connection
Audio Steganography
Hiding a secret messages/data into an audio file
Bytes/Bits
Used in traditional data exchanges
CASB
Cloud Access Security Broker
Software tool/service. Acts as a gatekeeper allowing the organization to extend the reach of their security policies into the cloud
CER
Cross Error Rate – The point where FAR & the FRR cross over. Provides a means of comparing biometric systems based on efficiently…Lower CER = More desirable
Cryptographic Hashes
Used for integrity checking of files, network packets, and a variety of other applications
CSRF/XSRF (A.K.A.- Session Riding, Sea Surf)
Cross Site Request Forgery – takes advantage of the cookies and URL parameters legitimate sites used to help track serve their visitors. Tricks a web browser into executing an unwanted action in an application to which a user is logged in
DHCP
Dynamic Host Configuration Protocol
Sniffing or snooping can be enabled to prevent rouge DHCP servers as well as malicious DHCP traffic
Used to automatically assign an Internet Protocol (IP) address to any device on a network so they can communicate using IP
Assigns IP address to your laptop, phone, iPad etc. And when your use Wi-Fi at home the router is a DHCP server
Port 67 (server destination) 68 (client)
https://bluecatnetworks.com/glossary/what-is-dhcp/
DMZ
Demilitarized Zone – Perimeter network that protects an organization’s internal local area network (LAN) from untrusted traffic
ECC
Elliptic Curve Cryptography – key-based technique for encrypting data. Small key size but is still very secure
Used a lot in mobile devices. Asymmetric
Extranet
Private networks that allow access to partners or customers but not to the general public
FAR
False Acceptance Rate
Faraday Cage
Placed around an area or device to block electromagnetic signals (EMI – Electromagnetic interference)
Fileless Virus
Type of malicious activity that uses native, legitimate tools built into a system to execute an attack. Uses legitimate programs (PowerShell) to infect a computer