Security+ Set B Flashcards

1
Q

BAS (building automation system)

A

components and protocols that facilitate the centralized configuration and monitoring of mechanical and electrical systems within offices and data centers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

BIA (business impact analysis)

A

a systematic activity that identifies organizational risks and determines their effect on ongoing, mission critical operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

BPA (business partnership agreement)

A

agreement by two companies to work together closely, such as the partner agreements that large IT companies set up with resellers and solution providers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

BPDU guard (bridge protocol data unit guard)

A

switch port security feature that disables the port if it receives BPDU notifications related to spanning tree. This is configured on access ports where there any BPDU frames are likely to be malicious.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

BYOD

A

security framework and tools to facilitate use of personally-owned devices to access corporate networks and data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

baseband radio

A

the chip and firmware in a smartphone that acts as a cellular modem.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

baseline configuration

A

a collection of security and configuration settings that are to be applied to a particular system or network in the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

bash (bourne again shell)

A

a command shell and scripting language for Unix-like systems. bastion host A server typically found in a DMZ that is configured to provide a single service to reduce the possibility of compromise.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

behavioral analysis

A

a network monitoring system that detects changes in normal operating data sequences and identifies abnormal sequences. Also known as behavior-based detection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

birthday attack

A

a type of password attack that exploits weaknesses in the mathematical algorithms used to encrypt passwords, in order to take advantage of the probability of different password inputs producing the same encrypted output.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

block cipher

A

a type of symmetric encryption that encrypts data one block at a time, often in 64-bit blocks. It is usually more secure, but is also slower, than stream ciphers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

blockchain

A

a concept in which an expanding list of transactional records listed in a public ledger is secured using cryptography.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

blue team

A

the defensive team in a penetration test or incident response exercise.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

bluejacking

A

sending an unsolicited message or picture message using bluetooth connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

bluesnarfing

A

wireless attack where an attacker gains access to unauthorized information on a device using a bluetooth connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

boot attestation

A

report of a boot state integrity data that is signed by a tamper proof TPM key and reported to a network server.

17
Q

botnet

A

set of hosts that has been infected by a control program called a bot that enables attackers to exploit the hosts to mount attacks. Also known as zombie.

18
Q

brute force attack

A

a type of password attack where an attacker uses an application to exhaustively try every possible alphanumeric combination to crack encrypted passwords.

19
Q

buffer overflow

A

an attack in which data goes past the boundary of the destination buffer and begins to corrupt adjacent memory. This can allow the attacker to crash the system or execute arbitrary code.

20
Q

bug bounty

A

reward scheme operated by software and web services vendors for reporting vulnerabilities