Practice 5 COPY Flashcards
UPS
Uninterruptible power supply
VNC
Virtual Network Client
TACACS+
Terminal Access Controller Access-Control System Plus
RADIUS
Remote Access Dial In User Service
RADIUS
Remote Access Dial In User Service
ISAKMP
Internet Security Association and Key Management
ISAKMP
Internet Security Association and Key Management
PCI-DSS
Payment Card Industry Data Security Standard
PCI-DSS
Payment Card Industry Data Security Standard
AES
Advanced Encryption Standard
COBO
CYOD
COPE
BYOD
Company Owned/Business Only
Choose Your Own Device
Company Owned/Personally Enabled
Bring Your Own Device
AES
Advanced Encryption Standard
A significant over-voltage event that occurs for a very short period of time. Usually lasts for less than three nanoseconds.
Power Spike
A sudden increase in voltage that lasts for three nanoseconds or more.
Power Surge
A total loss of power
Power Failure/Loss
DLP
Data Loss Prevention
The shape or structure of a network in a physical or logical format as depicted in a network diagram.
Network Topology
When a vender is aware of a security flaw, but a patch has not been developed, a malicious actor can craft an attack and take advantage of the vulnerability. What type of attack is this?
Zero-Day
A physical security access control system comprising a small space with two sets of interlocking doors, such that the first set of doors must close before the second set opens.
Access Control Vestibule
A placeholder in a script containing a number, character, or string of characters. They do not have to be declared but can be assigned a value
Variable
A hardware token that generates a random number code synchronized to a code on the server. The code changes every 60 seconds or so.
Key Fob
A small device that can operate with or without an operating system installed on the client device. This device can instead boot directly from a network-based operating system on a common server and access applications on the company’s application server.
Thin Client
RFC
Request for Change
When a scammer pretends to be someone else to steal data or money or to spread malware
Spoofing
AAA
Accounting, Authorization, and Authentication
A AAA (Accounting, Authorization, and Authentication) protocol to provide AAA services for access to routers, network access points, and other networking devices.
TACACS+ (Terminal Access Controller Access-Control System Plus)
TACACS+
Terminal Access Controller Access-Control System Plus
NAT
Network Address Translation
A network service provided by a router or a proxy server to map private local addresses to one or more publicly accessible IP addresses
Network Address Translation (NAT)
UPnP
Universal Plug-and-Play
A protocol framework allowing network devices to autoconfigure services, such as allowing a games console to request appropriate settings from a firewall.
Universal Plug-and-Play (UPnP)
Are Hub-and-Spoke and Mesh networking models used in workgroups or domains?
No
ICSSPLOIT
Industrial Control System Exploitation
What is used to identify the host identifier and the network identifier uniquely in combination with the IP address?
Subnet Mask
GDPR
General data Protection Regulation
A regulation created in the European Union that creates provisions and requirements to protect the personal data of European Union citizens
General Data Protection Regulation (GDPR)
This happens when the humidity is too low in a server room
Electrostatic Discharge
ARP
Address Resolution Protocol
The sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices.
Bluejacking
The first 512-byte sector of a hard disk
Master Boot Record (MBR)
MBR
Master Boot Record
PCI-DSS
Payment Card Industry Data Security Standard
AES
Advances Encryption System
An attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other
On-Path Attack
A local plain text file that maps servers or hostnames to IP addresses.
hosts.ini
Attackers often modify which file to redirect users to a malicious website instead of one they would commonly use.
hosts.ini