FBLA Practice Flashcards

1
Q

IBM, Microsoft, and Novell universal biometric standard

A

Bio API

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Attack type that relies on trust and deception

A

Social Engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How can you prevent intruders from accessing your wireless network?

A

Restrict to known MAC addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Microsoft Passport is what?

A

Single Sign-On

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Computer system designed to trap intruders

A

Honeypot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Stateful Inspection

A

Compares parts of a packet to trusted information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

TCP

A

Internet protocol to get data from one device to another (Transmission Control Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

UDP

A

Protocol for information without a response, like streaming (User Datagram Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

ICMP

A

Router to Router Protocol (Internet Control Message Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

SMTP

A

Email or text transfer protocol (Simple Mail Transfer Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

SNMP

A

Used to collect system info from a remote computer (Simple Network Management Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Telnet

A

Used to preform commands on a remote machine (often insecure)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Application Backdoor

A

Hidden access coded in by developer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

SMTP Session Hijacking

A

Allows access to email addresses and therefore spam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Email Bomb

A

Large quantity of email to overwhelm server, prevents access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Redirect bomb

A

Attack using ICMP to change the path of information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Source Routing

A

Controlling the path of a packet from the source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Proxy Server

A

Server that local packets go through before internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Adware

A

Malware the displays ads, often collecting personal info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Attack

A

Bypassing security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Audit trail

A

Recording showing who and what a user did on a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Authentication

A

Verifying a user’s identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Blended threat

A

Combining types of malware to inflict maximum damage, such a trojan horse worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Dictionary Attack

A

Using a list of words to try and find a password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Brute-force attack

A

Using every possible possible password combination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

EULA

A

End User License Agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Flooding

A

Denial of Service through sending large amounts of data

28
Q

Pharming

A

Like Phishing, except done through DNS poisoning (redirecting a user through false information put into a DNS server)

29
Q

RADIUS

A

Authentication service used by ISPs to manage access to the ISP system

30
Q

Retro-Virus

A

Infects all backup media to ensure you cannot restore system

31
Q

Rootkit

A

Allows complete access to a system with a hidden presence

32
Q

Smurfing

A

Denial of service attack using ICMP and a Smurfed IP address, exploits Echo requests

33
Q

Spyware

A

Hidden components of software that harvest personal information

34
Q

Threat

A

Anything that has the potential to attack or threaten a system

35
Q

Vulnerability

A

Something that a threat can exploit to carry out an attack

36
Q

Worm

A

Self Replicating program, often used to clog networks through its spread

37
Q

Worm

A

Self Replicating program, often used to clog networks through its spread

38
Q

APT

A

Advanced Persistent Threat, coordinated, complex, and long term threat

39
Q

Air Gap

A

Physically Isolation of a network

40
Q

Asymmetric Cryptography

A

Private/Public Key Cryptography, Must use both keys, allows no shared secrets

41
Q

Botnet

A

Multiple computers AKA zombies, controlled by single entity, used for DDoS,

42
Q

CERT

A

Computer Emergency Response Team, often government or corporate run teams of cybersec. expertise

43
Q

Conflicker

A

2008 Computer Worm, noteworthy for large size of botnet and international response

44
Q

DNS

A

Domain Name System, translates IP addresses into words

45
Q

FedRAMP

A

Federal Risk and Authorization Management Program, 2012 Program that allowed 1 certification for all US Civilian Government Work

46
Q

FedRAMP

A

Federal Risk and Authorization Management Program, 2012 Program that allowed 1 certification for all US Civilian Government Work

47
Q

GhostNet

A

1295 computer botnet, spread over 103 countries, discovered 2004, most likely used by China to target the West

48
Q

ICS

A

Industrial Control System, runs large scale industry, such as factories, to pipelines

49
Q

ISAC

A

Information Sharing and Analysis Center, Hub to share information with an industry for critical infrastructure

50
Q

Integrity Attack

A

An attack for changing data, rather than extracting it

51
Q

ICANN

A

Internet Corporation for Assigned Names and Numbers, 1998 Nonprofit took over US Gov. control of DNS and Internet Policy

52
Q

ITU

A

1865 Founded UN Agency in charge of Telecommunications (International Telecommunications Union)

53
Q

IETF

A

Internet Engineering Task Force, developed standards and protocols, part of ISOC

54
Q

ISOC

A

Internet Society, group of agencies in charge of developing internet policy

55
Q

NIST

A

US Commerce Department, develops industry standards

56
Q

Operation Orchard

A

2007 Israeli strike on Syrian Nuclear Research

57
Q

Operation Shady RAT

A

2006 Series of Cyber attacks, comprised confidential information of 70+ major firms and agencies

58
Q

Red team

A

Simulated attack group of white hat hackers

59
Q

Root access

A

Ability to change every file on a system

60
Q

SIPRNet

A

Secure Internet Protocol Router Network, US Military Classified INTRAnet, uses common Internet Protocol

61
Q

SCADA

A

Supervisory Control and Data Acquisition, Industrial Control System to manage sensors and control large facilities

62
Q

TOR

A

The Onion Router, used to provide online anonymity, developed by US Gov. now volunteer run

63
Q

SQL

A

Structured Query Language, used to access and manage databases in servers

64
Q

SQL Injection

A

Using a website to pass SQL code to gain access to a database and the information within

65
Q

typosquatting

A

registering domain names that may be close to the original (fisney instead of disney)

66
Q

Watering Hole

A

Attack on a specific group by compromising website used frequently by members of that group

67
Q

Zero Day

A

Exploits a previously unknown vulnerability, “zeroth day of awareness”