P-GLOSSARY Flashcards

1
Q

Packet

A

Data unit that is routed from source to destination in a packet-switched network. A packet contains both routing information and data.
Transmission Control Protocol/Internet Protocol (TCP/IP) is such a packet-switched network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Packet filtering

A

Controlling access to a network by analyzing the attributes of the incoming and outgoing packets, and either letting them pass or denying them based on a list of rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Packet sniffer

A

Software that observes and records network traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Packet switched network

A

Individual packets follow their own paths through the network from one endpoint to another and reassemble at the destination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Partitions

A

Major divisions of the total physical hard disk space

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Passive response

A

A response option in intrusion detection in which the system simply reports and records the problem detected, relying on the user to take subsequent action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Password cracker

A

A tool that tests the strength of user passwords searching for passwords that are easy to guess. It repeatedly tries words from specially crafted
dictionaries and often also generates thousands (and in some cases, even millions) of permutations of characters, numbers and symbols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Penetration testing

A

A live test of the effectiveness of security defenses through mimicking the actions of real-life attackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Personally Identifiable Information (PII)

A

Information that can be used alone or with other sources to uniquely identify, contact or locate a single individual

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Pharming

A

This is a more sophisticated form of a man-in-the-middle (MITM) attack.
A user’s session is redirected to a masquerading web site. This can be achieved by corrupting a domain name system (DNS) server on the
Internet and pointing a URL to the masquerading web site’s IP address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Phishing

A

This is a type of electronic mail (email) attack that attempts to convince a user that the originator is genuine, but with the intention of obtaining
information for use in social engineering. Phishing attacks may take the form of masquerading as a lottery organization advising the recipient or the user’s bank of a large win; in either case, the intent is to obtain account and personal identification number (PIN) details. Alternative attacks may seek to obtain apparently innocuous business information, which may be used in another form of active attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Platform as a Service (PaaS)

A

Offers the capability to deploy onto the cloud infrastructure custome rcreated or -acquired applications that are created using programming
languages and tools supported by the provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Policy

A

Overall intention and direction as formally expressed by management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Port

A

A hardware interface between a CPU and a peripheral device. Can also refer to a software (virtual) convention that allows remote services to connect to a host operating system in a structured manner.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Privacy

A

Freedom from unauthorized intrusion or disclosure of information of an individual.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Private key

A

A mathematical key (kept secret by the holder) used to create digital signatures and, depending on the algorithm, to decrypt messages or files encrypted (for confidentiality) with the corresponding public key

17
Q

Procedure

A

A document containing a detailed description of the steps necessary to perform specific operations in conformance with applicable standards
Procedures are defined as part of processes.

18
Q

Proxy server

A

A server that acts on behalf of a user. Typically proxies accept a connection from a user, make a decision as to whether or not the user or client IP address is permitted to use the proxy, perhaps perform additional
authentication, and then complete a connection to a remote destination on behalf of the user.

19
Q

Public key

A

In an asymmetric cryptographic scheme, the key that may be widely published to enable the operation of the scheme.