OP Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

Offline files

A

Computer file storage media that are not physically connected to the computer; typical examples are tapes or tape cartridges used for backup purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Open Source Security Testing Methodology

A

An open and freely available methodology and manual for security testing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Outcome measure

A

Represents the consequences of actions previously taken; often referred to as a lag indicator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Packet filtering

A

Controlling access to a network by analyzing the attributes of the incoming and outgoing packets and either letting them pass, or denying them, based on a list of rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Packet switching

A

The process of transmitting messages in convenient pieces that can be reassembled at the destination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Packet

A

Protocol data unit that is routed from source to destination in a packet-switched network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Paper test

A

A walk-through of the steps of a regular test, but without actually performing the steps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Partitioned file

A

A file format in which the file is divided into multiple sub files and a directory is established to locate each sub file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Passive response

A

A response option in intrusion detection in which the system simply reports and records the problem detected, relying on the user to take subsequent action.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Password cracker

A

A tool that tests the strength of user passwords by searching for passwords that are easy to guess. It repeatedly tries words from specially crafted dictionaries and often also generates thousands (and in some cases, even millions) of permutations of characters, numbers and symbols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Penetration testing

A

A live test of the effectiveness of security defenses through mimicking the actions of real-life attackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Personally identifiable information (PII)

A

Any information that can be used to establish a link between the information and the natural person to whom such information relates, or that is or might be directly or indirectly linked to a natural person

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Phishing

A

A type of electronic mail (email) attack that attempts to convince a user that the originator is genuine, but with the intention of obtaining information for use in social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Platform as a Service (PaaS)

A

Offers the capability to deploy onto the cloud infrastructure customer-created or -acquired applications that are created using programming languages and tools supported by the provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Policy

A

A document that communicates required and prohibited activities and behaviors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Port

A

A process or application-specific software element serving as a communication endpoint for the transport layer IP protocols (UDP and TCP)

17
Q

Privacy

A

The right of an individual to trust that others will appropriately and respectfully use, store, share and dispose of his/her associated personal and sensitive information within the context, and according to the purposes for which it was collected or derived

18
Q

Private key

A

A mathematical key (kept secret by the holder) used to create digital signatures and, depending on the algorithm, to decrypt messages or files encrypted (for confidentiality) with the corresponding public key.

19
Q

Procedure

A

A document containing a detailed description of the steps necessary to perform specific operations in conformance with applicable standards. Procedures are defined as part of processes.

20
Q

Proxy server

A

A server that acts on behalf of a user

21
Q

Public key

A

In an asymmetric cryptographic scheme, the key that may be widely published to enable the operation of the scheme.