FBLA Practice Flashcards
IBM, Microsoft, and Novell universal biometric standard
Bio API
Attack type that relies on trust and deception
Social Engineering
How can you prevent intruders from accessing your wireless network?
Restrict to known MAC addresses
Microsoft Passport is what?
Single Sign-On
Computer system designed to trap intruders
Honeypot
Stateful Inspection
Compares parts of a packet to trusted information
TCP
Internet protocol to get data from one device to another (Transmission Control Protocol)
UDP
Protocol for information without a response, like streaming (User Datagram Protocol)
ICMP
Router to Router Protocol (Internet Control Message Protocol)
SMTP
Email or text transfer protocol (Simple Mail Transfer Protocol)
SNMP
Used to collect system info from a remote computer (Simple Network Management Protocol)
Telnet
Used to preform commands on a remote machine (often insecure)
Application Backdoor
Hidden access coded in by developer
SMTP Session Hijacking
Allows access to email addresses and therefore spam
Email Bomb
Large quantity of email to overwhelm server, prevents access
Redirect bomb
Attack using ICMP to change the path of information
Source Routing
Controlling the path of a packet from the source
Proxy Server
Server that local packets go through before internet
Adware
Malware the displays ads, often collecting personal info
Attack
Bypassing security
Audit trail
Recording showing who and what a user did on a computer
Authentication
Verifying a user’s identity
Blended threat
Combining types of malware to inflict maximum damage, such a trojan horse worm
Dictionary Attack
Using a list of words to try and find a password
Brute-force attack
Using every possible possible password combination
EULA
End User License Agreement