Terms Deck 4 Flashcards

1
Q

stream cipher

A

A cipher in which plaintext bits are encrypted a single bit at a time and combined with a stream of pseudo-random characters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

block cipher

A

An algorithm that transforms a message from plaintext (unencrypted form) to ciphertext (encrypted form), one piece at a time. The block size represents a standard chunk of data that is transformed in a single operation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

steganography

A

A word of Greek origin meaning “hidden writing” that refers to hiding messages so that unintended recipients are not even aware that a message exists.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Domain Name System Security Extensions (DNSSEC)

A

A suite of specifications that provides protection against DNS attacks by authenticating DNS response data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Secure Shell (SSH)

A

A protocol designed to support secure remote login, along with secure access to other services across an insecure network. SSH includes a secure transport layer protocol that provides server authentication, confidentiality (encryption), and integrity (message digest functions), along with a user authentication protocol and a connection protocol that runs on top of the user authentication protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Secure/Multipurpose Internet Mail Extensions (S/MIME)

A

An Internet protocol specified in RFC 2633 and used to secure email communications through encryption and digital signatures for authentication. It generally works with PKI to validate digital signatures and related digital certificates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Hypertext Transfer Protocol over SSL (HTTPS)

A

A protocol used in a secured connection that encapsulates data transferred between the client and web server. It occurs on port 443.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Internet Protocol Security (IPsec)

A

A tool used for the encryption of TCP/IP traffic. IPsec provides security extensions to IPv4. It manages special relationships, called security associations, between pairs of machines.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Authentication Header (AH)

A

A component of the IPsec protocol that provides integrity, authentication, and antireplay capabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Encapsulated Security Payload (ESP)

A

A method that provides confidentiality, data origin authentication, connectionless integrity, an antireplay service, and traffic flow confidentiality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

antivirus

A

A software program used to protect the user environment that scans for email and downloadable malicious code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

host-based intrusion prevention system (HIPS)

A

A software intrusion detection system capable of reacting to and preventing or terminating unauthorized access within a single host system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

host-based intrusion detection system (HIDS)

A

Systems that monitor communications on a host-by-host basis and try to filter malicious data. These types of IDSs are good at detecting unauthorized file modifications and user activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

fuzzing

A

An unknown environment for software testing in which semirandom data is injected into a program or protocol stack to detect bugs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

self-encrypting drive (SED)

A

A hard disk that continually performs full disk encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Trusted Platform Module (TPM)

A

A standard for secure crypto-processor chips that are used to authenticate hardware devices such as PCs or laptops.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

sandboxing

A

A method that allows programs and processes to be run in an isolated environment, to limit access to files and the host system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

demilitarized zone (DMZ)

A

An area in a network that allows limited and controlled access from the public Internet. Also called a screened subnet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

virtual private network (VPN)

A

A popular technology that supports reasonably secure logical private network links across some insecure public network infrastructure, such as the Internet. VPNs are more secure than traditional remote access because they can be encrypted and because VPNs support tunneling (hiding numerous types of protocols and sessions within a single host-to-host connection).

20
Q

network-based intrusion detection system (NIDS)

A

An IDS that monitors packet flow and tries to locate unauthorized packets that might have gotten through the firewall. A NIDS may be used to detect DoS attacks and unauthorized user access.

21
Q

network-based intrusion prevention system (NIPS)

A

A device or software program designed to sit inline with traffic flows and prevent attacks in real time.

22
Q

web application firewall (WAF)

A

Software or a hardware appliance used to protect an organization’s web server from attack.

23
Q

next-generation firewalls (NGFW)

A

A firewall that goes beyond traditional port and IP address examination to include application and user awareness.

24
Q

access control list (ACL)

A

In the broadest sense, the underlying data associated with a network resource that defines the access permissions. The most common privileges include the ability to read, write to, delete, and execute a file.

25
Q

Wi-Fi Protected Access Version 2 (WPA2)

A

WPA technology that replaced the original version. It improved the security of Wi-Fi connections by requiring the use of stronger wireless encryption than WPA required.

26
Q

Counter Mode Cipher Block Chaining Message Authentication Code Protocol (CCMP)

A

A protocol based on the Advanced Encryption Standard (AES) encryption cipher.

27
Q

Protected EAP (PEAP)

A

An encrypted form of the EAP authentication protocol, which couples EAP with transport encryption to protect credentials during transfer.

28
Q

EAP Flexible Authentication via Secure Tunneling (EAP-FAST)

A

A proposed replacement to the Lightweight Extensible Authentication Protocol (LEAP) used for wireless authentication connections.

29
Q

EAP-Transport Layer Security (EAP-TLS)

A

A protocol that uses certificate-based mutual authentication, negotiation of the encryption method, and encrypted key determination between the client and the authenticating server.

30
Q

EAP Tunneled Transport Layer Security (EAP-TTLS)

A

A protocol that is similar to PEAP but further extends TLS. With an established secure tunnel, the server authenticates the client using authentication attributes in the TLS wrapper.

31
Q

IEEE 802.1X

A

A standard designed to enhance the security of wireless networks.

32
Q

Remote Authentication Dial-In User Service (RADIUS)

A

An Internet protocol used for remote-access services. It conveys user authentication and configuration data between a centralized authentication server and a remote-access server (RADIUS client) to permit the remote-access server to authenticate requests to use its network access ports.

33
Q

Wi-Fi Protected Setup (WPS)

A

An extension of wireless standards that enables end users to easily establish secure wireless home networks. Originally known as Wi-Fi Simple Config.

34
Q

captive portal

A

A web page that is first launched when a user is connecting through a network and that usually requires some type of interaction before the user is allowed access to other networking or Internet sites.

35
Q

rooting/jailbreaking

A

A process that enables complete access to a mobile device. Root-level access allows a user to configure the device to run unauthorized apps and set different permissions by circumventing Android’s security architecture.

36
Q

sideloading

A

A process in which a user goes around the approved vendor app marketplace and device settings to install unapproved apps.

37
Q

bring your own device (BYOD)

A

A policy that allows employees to use personal mobile devices for access to enterprise data and systems.

38
Q

corporate-owned, personally enabled (COPE)

A

A policy by which employees are able to use corporate-owned devices for personal use.

39
Q

choose your own device (CYOD)

A

An option in which an organization controls the devices an employee can use by providing a list of approved devices.

40
Q

virtual desktop infrastructure (VDI)

A

The server-based virtualization technology that hosts and manages virtual desktops.

41
Q

geofencing

A

The use of GPS coordinates or radio-frequency identification (RFID) to define a geographic perimeter.

42
Q

Challenge Handshake Authentication Protocol (CHAP)

A

A widely used authentication method in which a hashed version of a user’s password is transmitted during the authentication process.

43
Q

Password Authentication Protocol (PAP)

A

A legacy plaintext authentication protocol for remote server access that does not support stronger authentication mechanisms.

44
Q

Security Assertion Markup Language (SAML)

A

An Extensible Markup Language (XML) standard that allows a user to use single sign-on for affiliated but separate websites.

45
Q

Terminal Access Controller Access Control System Plus (TACACS+)

A

An authentication, access control, and accounting standard that relies on a central server to provide access over network resources, including services, file storage, and network routing hardware.