Exam 2 Flashcards

1
Q

Internet

A

network of computers/similar devices throughout the world

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

World Wide Web

A

collection of pages (digital documents of content)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Man-in-the-browser

A

can utilize anything a user inputs into a browser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Keystroke Logger

A

hardware/software that records user keystrokes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Page-in-the-middle

A

the user is redirected to another page

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Download Substitution

A

user installs malicious code instead of/in addition to their intended download

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Website Defacement

A

when an attacker replaces/modifies content of a website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Fake Website

A

A copy of a real website (like a bank webpage) that looks realistic, so users enter information willingly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Integrity Checksum

A

Can detect altered content on a website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Signed code or data

A

a digital signature on code, vouching its authenticity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Web Bug

A

a tiny image loaded on a website, letting its owner know of its display on another user’s screen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Click Jacking

A

Disguising what a link actually leads to

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Least Privilege

A

giving people access to as few resources as necessary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Multiprogrammed Operating Systems

A

a monitor overseeing each program’s execution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Multitasking Operating Systems

A

allows multiple users to perform multiple tasks at the same time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Hook (as in Hook into an operating system)

A

be incorporated into an operating system

17
Q

Audit Logs

A

a record of who accessed what and how

18
Q

Virtual Machine

A

operating system offering user only what they need to see, and nothing else

19
Q

Trusted System

A

a system with evidence to support the claim it uses a function or policy

20
Q

Root

A

highest privilege user

21
Q

Routing

A

when a device figures out how best to forward along data

22
Q

Induction

A

tapping a wire and reading the radiation signals

23
Q

OSI model (know the definition, not all layers)

A

a virtual concept of computer network communications

24
Q

MAC address

A

unique identifier of a network interface card that connects a computer and a network

25
Q

802.11n

A

wifi 4: range: 1000 ft. what most wifi-enabled computers communicate on

26
Q

WPA3

A

the upgraded version of wifi protected access

27
Q

Denial of Service

A

preventing availability to resources

28
Q

Flooding Attack

A

sending more requests/demands then what the system can handle

29
Q

Ping of Death

A

a flood attack using ping

30
Q

Distributed Denial of Service

A

marshalls many forces on the attack side, using bots

31
Q

Link Encryption

A

data is encrypted just before the system places them on the physical communications link

32
Q

Onion Routing

A

sending data through multiple hosts, so they only know who they got it from and who they’re sending it to

33
Q

Virtual Private Network

A

simulates the security of a dedicated protected communication line on a shared network

34
Q

Firewall

A

a device whose purpose is to block bad things

35
Q

Protected Subnet

A

the computers that aren’t visible to the outside network

36
Q

Default Permit (in firewalls)

A

“That which is not expressly forbidden is permitted”

37
Q

Default Deny (in firewalls)

A

“That which is not expressly permitted is forbidden”

38
Q

DMZ

A

(Demilitarized Zone) The part of a network that’s exposed to the larger internet network

39
Q

NAT

A

(Network address translation) Mapping multiple private addresses inside a local network to a public IP address before transferring the info to the internet