Practice 5 COPY Flashcards

1
Q

UPS

A

Uninterruptible power supply

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

VNC

A

Virtual Network Client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

TACACS+

A

Terminal Access Controller Access-Control System Plus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

RADIUS

A

Remote Access Dial In User Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

RADIUS

A

Remote Access Dial In User Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

ISAKMP

A

Internet Security Association and Key Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

ISAKMP

A

Internet Security Association and Key Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

PCI-DSS

A

Payment Card Industry Data Security Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

PCI-DSS

A

Payment Card Industry Data Security Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

AES

A

Advanced Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

COBO
CYOD
COPE
BYOD

A

Company Owned/Business Only
Choose Your Own Device
Company Owned/Personally Enabled
Bring Your Own Device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

AES

A

Advanced Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A significant over-voltage event that occurs for a very short period of time. Usually lasts for less than three nanoseconds.

A

Power Spike

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A sudden increase in voltage that lasts for three nanoseconds or more.

A

Power Surge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A total loss of power

A

Power Failure/Loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

DLP

A

Data Loss Prevention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The shape or structure of a network in a physical or logical format as depicted in a network diagram.

A

Network Topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

When a vender is aware of a security flaw, but a patch has not been developed, a malicious actor can craft an attack and take advantage of the vulnerability. What type of attack is this?

A

Zero-Day

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A physical security access control system comprising a small space with two sets of interlocking doors, such that the first set of doors must close before the second set opens.

A

Access Control Vestibule

20
Q

A placeholder in a script containing a number, character, or string of characters. They do not have to be declared but can be assigned a value

A

Variable

21
Q

A hardware token that generates a random number code synchronized to a code on the server. The code changes every 60 seconds or so.

A

Key Fob

22
Q

A small device that can operate with or without an operating system installed on the client device. This device can instead boot directly from a network-based operating system on a common server and access applications on the company’s application server.

A

Thin Client

23
Q

RFC

A

Request for Change

24
Q

When a scammer pretends to be someone else to steal data or money or to spread malware

A

Spoofing

25
Q

AAA

A

Accounting, Authorization, and Authentication

26
Q

A AAA (Accounting, Authorization, and Authentication) protocol to provide AAA services for access to routers, network access points, and other networking devices.

A

TACACS+ (Terminal Access Controller Access-Control System Plus)

27
Q

TACACS+

A

Terminal Access Controller Access-Control System Plus

28
Q

NAT

A

Network Address Translation

29
Q

A network service provided by a router or a proxy server to map private local addresses to one or more publicly accessible IP addresses

A

Network Address Translation (NAT)

30
Q

UPnP

A

Universal Plug-and-Play

31
Q

A protocol framework allowing network devices to autoconfigure services, such as allowing a games console to request appropriate settings from a firewall.

A

Universal Plug-and-Play (UPnP)

32
Q

Are Hub-and-Spoke and Mesh networking models used in workgroups or domains?

A

No

33
Q

ICSSPLOIT

A

Industrial Control System Exploitation

34
Q

What is used to identify the host identifier and the network identifier uniquely in combination with the IP address?

A

Subnet Mask

35
Q

GDPR

A

General data Protection Regulation

36
Q

A regulation created in the European Union that creates provisions and requirements to protect the personal data of European Union citizens

A

General Data Protection Regulation (GDPR)

37
Q

This happens when the humidity is too low in a server room

A

Electrostatic Discharge

38
Q

ARP

A

Address Resolution Protocol

39
Q

The sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices.

A

Bluejacking

40
Q

The first 512-byte sector of a hard disk

A

Master Boot Record (MBR)

41
Q

MBR

A

Master Boot Record

42
Q

PCI-DSS

A

Payment Card Industry Data Security Standard

43
Q

AES

A

Advances Encryption System

44
Q

An attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other

A

On-Path Attack

45
Q

A local plain text file that maps servers or hostnames to IP addresses.

A

hosts.ini

46
Q

Attackers often modify which file to redirect users to a malicious website instead of one they would commonly use.

A

hosts.ini