Midterm 2 Key Definitions Flashcards

1
Q

Vulnerability

A

A flaw or weakness in a program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Exploit

A

Software code that can be used to take advantage of a flaw and compromise a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Authentication

A

Verification of claimed identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Authorization

A

Restricting the actions that a user is permitted to perform

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Demilitarized Zone (DMZ)

A

A subnetwork that is accessible from the Internet but separate from the organization’s internal network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Deep Packet Inspection

A

A firewall technique that filters traffic by examining not just packet header information but also the contents of a packet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Router

A

A device that uses the Internet Protocol (IP) to send packets across networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Social Engineering

A

AN attack that involves deception to obtain access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Firewall

A

A device that provides perimeter security by filtering packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Hardening

A

Improving security by removal or disabling of unnecessary programs and features

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

CIRT

A

The set of employees assigned responsibility for resolving problems and incidents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Patch

A

Code that corrects a flaw in a program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Virtualization

A

The process of running multiple machines on one physical server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Change control and change management

A

A plan to ensure that modifications to an information system do not reduce its security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Packet Filtering

A

The firewall technique that filters traffic by examining only the information in packet headers to test the rules in an ACL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Border Router

A

The device that connects the organization to the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Vulnerability Scan

A

A detective control that identifies weaknesses in devices or software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Penetration Test

A

A dest that determines the time it takes to compromise a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Patch Management

A

The process of applying code supplied by a vendor’s software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Cloud Computing

A

An arrangement whereby a user remotely accesses software, hardware, or other resources via a browser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Virtual Private Network (VPN)

A

An encrypted tunnel used to transmit information securely across the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Data Loss Prevention (DLP)

A

A procedure to filter outgoing traffic to prevent confidential information from leaving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Digital Signature

A

A hash encrypted with the creator’s private key

24
Q

Digital Certificate

A

Used to store an entity’s public key, often found on web sites

25
Q

Data Masking

A

Replacing real data with fake data

26
Q

Symmetric encryption

A

An encryption process that uses the same key to both encrypt and decrypt

27
Q

Spam

A

Unwanted email

28
Q

Plaintext

A

A document or file that can be read by anyone who accesses it

29
Q

Hashing

A

A process that transforms a document or file into a fixed length string of data

30
Q

Ciphertext

A

A document or file that must be decrypted to be read

31
Q

Information Rights Management (IRM)

A

Software that limits what actions (read, copy, print, etc.) users granted access to a file or document can perform

32
Q

Certificate Authority

A

A company that issues pairs of public and private keys and verifies the identity of the owner of those keys

33
Q

Non-repudiation

A

The inability to unilaterally deny having created a document or file or having agreed to perform a transaction

34
Q

Digital Watermark

A

A secret mark used to identify proprietary information

35
Q

Asymmetric Encryption

A

An encryption process that uses a pair of matched keys, one public and the other private. Either key can encrypt something, but only the other key in that pair can decrypt it

36
Q

Key Escrow

A

A copy of an encryption key stored securely to enable decryption if the original encryption key becomes unavailable

37
Q

Business Continuity Plan (BCP)

A

A plan that describes how to resume business operations after a major calamity, like Hurricane Katrina, that destroys not only an organization’s data center but also its headquarters.

38
Q

Completeness Check

A

An application control that ensures that a customer’s ship-to address is entered in a sales order.

39
Q

Hash Total

A

A batch total that does not have any intrinsic meaning.

40
Q

Incremental Daily Backup

A

A daily backup procedure that copies only the activity that occurred on that particular day.

41
Q

Archive

A

A file used to store information for long periods of time

42
Q

Field Check

A

A data-entry application control that could be used to verify that only numeric data is entered into a field.

43
Q

Sign Check

A

An application control that verifies that the quantity ordered is greater than 0.

44
Q

Cold Site

A

A disaster recovery plan that contracts for use of an alternate site that is pre-wired for Internet connectivity but has no computing or network equipment

45
Q

Limit Check

A

An application control that tests whether a customer is 18 or older.

46
Q

Zero-Balance Test

A

An application control that makes sure an account does not have a balance after processing.

47
Q

Recovery Point Objective (RPO)

A

The amount of data an organization is willing to re-enter or possibly lose in the event of a disaster

48
Q

Recovery Time Objective (RTO)

A

A measure of the length of time that an organization is willing to function without its information system.

49
Q

Record Count

A

A batch total that represents the number of transactions processed.

50
Q

Validity Check

A

An application control that verifies that an account number entered in a transaction record matches an account number in the related master file.

51
Q

Check Digit Verification

A

A data-entry application control that verifies the accuracy of an account number by recalculating the last number as a function of the preceding numbers.

52
Q

Closed-Loop Verification

A

A data-entry application control that displays the value of a data item and asks the user to verify that the system has accessed the correct record.

53
Q

Parity Checking

A

A control that verifies that all data was transmitted correctly by counting the number of odd or even bits.

54
Q

Reasonable Test

A

An application control that validates the correctness of one data item in a transaction record by comparing it to the value of another data item in that transaction record.

55
Q

Financial Total

A

A batch total that represents the total dollar value of a set of transactions.

56
Q

Turnaround Document

A

A document sent to an external party and subsequently returned so that preprinted data can be scanned rather than manually reentered.