T Flashcards

1
Q

TACACS (Terminal Access Controller Access Control System)

A

A client/server authentication protocol that provides the same type of functionality as RADIUS and is used as a central access control mechanism mainly for remote users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

tactical goals

A

Midterm goals to accomplish. These may be milestones to accomplish within a project or specific projects to accomplish in a year. Strategic, tactical, and operational goals make up a planning horizon.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

technical controls

A

These controls, also called logical access control mechanisms, work in software to provide confidentiality, integrity, or availability protection. Some examples are passwords, identification and authentication methods, security devices, auditing, and the configuration of the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Tempest

A

The study and control of spurious electronic signals emitted by electrical equipment. Tempest equipment is implemented to prevent intruders from picking up information through the airwaves with listening devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

threat

A

Any potential danger that a vulnerability will be exploited by a threat agent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

top-down approach

A

An approach in which the initiation, support, and direction for a project come from top management and work their way down through middle management and then to staff members.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

topology

A

The physical construction of how nodes are connected to form a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

total risk

A

When a safeguard is not implemented, an organization is faced with the total risk of that particular vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

trademark

A

A legal right that protects a word, name, product shape, symbol, color, or a combination of these used to identify a product or a company.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Trojan horse

A

A computer program that has an apparently or actually useful function, but that also contains hidden malicious capabilities to exploit a vulnerability and/or provide unauthorized access into a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

trusted computer system

A

A system that has the necessary controls to ensure that the security policy will not be compromised and that can process a range of sensitive or classified information simultaneously.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

trusted computing base (TCB)

A

All of the protection mechanisms within a computer system (software, hardware, and firmware) that are responsible for enforcing a security policy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

trusted path

A

A mechanism within the system that enables the user to communicate directly with the TCB. This mechanism can be activated only by the user or the TCB and not by an untrusted mechanism or process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

trusted recovery

A

A set of procedures that restores a system and its data in a trusted manner after the system has been disrupted or a system failure has occurred.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly