Glossary- W Flashcards

1
Q

walkthrough

A

A review of some or all disaster recovery and business continuity plans, procedures, and other documentation. A walkthrough is performed by an entire group of individuals in a live discussion.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

wall

A

A structure that prevents or deters passage by unauthorized personnel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

WAN switch

A

A general term encompassing several types of wide area network switch- ing devices, including ATM switches, Frame Relay switches, MPLS switches, and ISDN switches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

war chalking

A

The practice of marking buildings (using chalk) with symbols to indi- cate the presence of a Wi-Fi access point, including some basic facts about it. See also war driving, Wi-Fi.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

war dialing

A

An attack designed to discover unprotected remote access modems by dialing phone numbers sequentially and recording those with modems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

war driving

A

An attack on a wireless network where attackers intercept and record in- formation about Wi-Fi access points.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

warm site

A

An alternate processing center where recovery systems are present, but at a lower state of readiness than recovery systems at a hot site. For example, while the same version of the operating system may be running on the warm site system, it may be a few patch levels behind primary systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

waterfall model

A

A software development life cycle process where activities are se- quential and are executed one time in a software project. See also software development life cycle (SDLC).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

web-based application

A

An application design where the database and all business logic are stored on central servers, and where user workstations use only web browsers to access the application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

web-based application development

A

A software development effort where the ap- plication’s user interface is based on the HTTP (Hypertext Transport Protocol) and HTML (Hypertext Markup Language) standards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

web proxy filter

A

A central program or device that monitors and, optionally, filters web communications. A web proxy filter is often used to control the sites (or categories of sites) that users are permitted to access from the workplace. Some web proxy filters can also protect an organization from malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

web server

A

A server that runs specialized software that makes static and dynamic HTML pages available to users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

web services

A

A means for system-to-system communications using the HTTP protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Web Services Description Language (WSDL)

A

An XML-based language that is used to

describe web services. See also web services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

wet pipe

A

A fire sprinkler system where all sprinkler pipes are filled with water. Each sprinkler head is equipped with a fuse—a heat-sensitive glass bulb—that breaks upon reaching a preset temperature. When this occurs, water is discharged from just that sprinkler head, which is presumably located near a fire. See also fire sprinkler system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Wi-Fi

A

The common name for a wireless LAN protocol. See also 802.11.

17
Q

Wi-Fi protected access (WPA)

A

An encryption standard for 802.11 wireless networks.

The final version of WPA is known as WPA-2. See also 802.11.

18
Q

wide area network (WAN)

A

A network whose size ranges from regional to interna- tional. This term is also used to describe a single point-to-point connection between two distant locations (a “WAN connection”).

19
Q

wideband code division multiple access (W-CDMA)

A

An airlink standard for wireless communications between mobile devices and base stations.

20
Q

wired equivalency protocol (WEP)

A

An encryption standard for 802.11 wireless net- works. WEP has been compromised and should be replaced with WPA-2. See also 802.11, Wi-Fi Protected Access (WPA).

21
Q

wireless USB (WUSB)

A

A short-range, high-bandwidth standard wireless communica- tions protocol used to connect computer peripherals.

22
Q

work breakdown structure (WBS)

A

A logical representation of the high-level and de- tailed tasks that must be performed to complete a project.

23
Q

worm

A

A type of malware containing stand-alone programs capable of human-assisted and automatic propagation.