Security Concepts Flashcards

1
Q

Intended to delay or deter entrance into a facility

A

Perimeter Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Used for mid-layer access control to prevent tailgating

A

Mantraps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Used for mid- and inner-layer access control

A

Multifactor Authentication

Strong Passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Uses the inherent trust in the human species, as opposed to technology, to gain access to your environment.

A

Social Engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Network based systems that detect intrusions

A

IDS systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Specifically intended to prevent access to network resources by flooding a service or network. Used to disrupt legitimate request from being answered.

A

DoS (denial-of-service)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Reproduces and move throughout the network to infect other systems. Does not rely on a host application to be transported.

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Software programs that have the ability to hide themselves from the operating system

A

Rootkits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Attack that uses multiple computer systems to attack a server or host in the network

A

DDoS (distributed denial-of-service)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Intercepts data and then sends it to the server as if nothing is wrong while collecting the information.

A

man-in-the-middle attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Attacks in which the developer has not patched a hole yet and is unaware of the hole.

A

Zero-day attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A type of DDoS in which large numbers of Internet Control Message Protocol (ICMP) packets with the intended victim’s spoofed source IP are broadcast to a computer network using an IP broadcast address.

A

Smurf attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

An attempt by someone or something to masquerade as someone else (IP address) and is often used to disrupt access.

A

Spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A type of social engineering where someone is trying to con your organization into revealing account and password information by pretending to be a high level person.

A

Spear Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Programs that enter a system or network under the guise of another program.

A

Trojan Horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Attack in which a password is guessed over and over again util the person gains access

A

Brute Force

17
Q

An embedded account that allows unauthorized access thru an unpatched coding hole

A

Backdoor attack

18
Q

Which Active Directory component maps printers and drives during login?

A

Login Scripts

19
Q

Security encryption used with WPA2/PSK

A

AES (Advanced Encryption Standard)

20
Q

Security encryption used with WPA/PSK

A

TKIP with RC4 algorithm

21
Q

Security encryption used with WEP

A

64-bit or 128-bit Passphrase