Mid-Term Flashcards
“4-1-9” fraud is an example of a __________ attack
social engineering
“4-1-9” is one form of a(n) __________ fraud.
advance-fee
A __________ is an attack in which a coordinated stream of requests is launched against a target from many locations at the same time.
Distributed Denial of service
A hacker who intentionally removes or bypasses software copyright protection designed to prevent unauthorized duplication or use is known as a(n) __________.
Cracker
A model of InfoSec that offers a comprehensive view of security for data while being stored, processed, or transmitted is the __________ security model
CNSS
A potential weakness in an asset or its defensive control system(s) is known as a(n) __________.
vulnerability.
process that defines what the user is permitted to do is known as __________.
Authorization.
A short-term interruption in electrical power availability is known as a __________.
Fault
A technique used to compromise a system is known as a(n) __________
exploit
Acts of __________ can lead to unauthorized real or virtual actions that enable information gatherers to enter premises or systems they have not been authorized to access.
Trepass
An attack that uses phishing techniques along with specialized forms of malware to encrypt the victim’s data files is known as__________.
ransomware
An information security professional with authorization to attempt to gain system access in an effort to identify and recommend resolutions for vulnerabilities in those systems is known as a(n) __________.
penetration tester.
An intentional or unintentional act that can damage or otherwise compromise information and the systems that support it is known as a(n) __________.
Attack
Any event or circumstance that has the potential to adversely affect operations and assets is known as a(n) __________
Threat
As frustrating as viruses and worms are, perhaps more time and money is spent on resolving virus __________.
hoaxes
Human error or failure often can be prevented with training and awareness programs, policy, and __________ .
controls
In the __________ attack, an attacker monitors (or sniffs) packets from the network, modifies them, and inserts them back into the network.
man-in-the-middle
One form of online vandalism is __________, in which individuals interfere with or disrupt systems to protest the operations, policies, or actions of an organization or government agency.
hacktivist
Technology services are usually arranged with an agreement defining minimum service levels known as a(n) __________.
SLA
The hash values for a wide variety of passwords can be stored in a database known as a(n) __________, which can be indexed and quickly searched using the hash value, allowing the corresponding plaintext password to be determined.
rainbow table
The protection of confidentiality, integrity, and availability of data regardless of its location is known as _______ security.
Information
The protection of voice and data components, connections, and content is known as _______ security.
network
The unauthorized duplication, installation, or distribution of copyrighted computer software, which is a violation of intellectual property, is called _______
software piracy.
The use of cryptographic certificates to establish Secure Sockets Layer (SSL) connections is an example of which process?
authentication.