IS4560 T&D CHAPTER 1 Flashcards

1
Q
  • Something of value that needs to be protected. In the IT realm, this can be data, software, or hardware.
A

Asset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  • The process of confirming that someone is who he or she claims to be, as with a username and password.
A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  • A kind of testing of a computer system in which the testing team must approach it like a “black box,” with no prior knowledge of it.
A

Black-box testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  • Someone who breaks into computer systems without authorization.
A

Cracker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  • Attacks in which a service is overwhelmed by traffic preventing or denying its legitimate use.
A

Denial of service (DoS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  • A DoS attack launched simultaneously from large numbers of hosts that have been compromised and act after receiving a particular command.
A

Distributed denial of service (DDoS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  • Gathering material that has been discarded or left in unsecured receptacles, such as trashcans or dumpsters.
A

Dumpster diving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  • Someone who knows how hacking works and understands the dangers its poses but uses those skills for good purposes; also known as a “white-hat hacker.”
A

Ethical hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  • A piece of software, data, or other similar item that can take advantage of a vulnerability or weakness inherent in a system.
A

Exploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  • Originally this term referred to the technology enthusiasts of the 1960s—those who today would be known as “geeks.” Nowadays it’s widely used to refer to pranksters and criminals.
A

Hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  • A software or hardware device that is designed to detect suspicious or anomalous behavior and report it to the system owner or administrator.
A

Intrusion detection system (IDS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  • A system that intercepts potentially hostile activity prior to it being processed.
A

Intrusion prevention system (IPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  • A piece of code designed to cause harm, intentionally inserted into a software system to be activated by some predetermined trigger.
A

Logic bomb

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  • A specific type of malware designed to hide on a system and open up backdoors through which an attacker can gain access, control, or other insight into a system.
A

Trojan horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  • The absence or weakness of a safeguard in an asset.
A

Vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  • A kind of testing in which the testing team is given advance knowledge of the system to be tested; contrasts with “black-box testing.”
A

White-box testing