Test Review Flashcards

0
Q

Stateful Inspection

A

Compares certain key parts of the packet to a database of trusted information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

Packet Filtering or Packet Purity

A

Analyzed against a set of filters. That make it through the filters are sent to the requesting system and others are discarded

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

IP Addresses

A

Blocks certain Ip addresses or a range of IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Protocols

A

Decides which if the systems can allow or have access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Ports

A

Blocking or disabling ports of severs that are connected. Maintain the kind of data flow you want to see and close down possible entry points for hackers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Keywords

A

Will block any website that has to deal with certain predetermined keywords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

IP

A

Internet Protocol. The main delivery system for information over the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

TCP

A

A protocol developed for the internet to get data from one network device to another

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

HTTP

A

Hyper Text Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

FTP

A

Files Transfer Protocol. Used to upload or download files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

UDP

A

User Datagram Protocol. Used for information that requires no response. For example streaming audio or video

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

ICMP

A

Internet Control Message Protocol. Used by a router to exchange information with other routers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

SMTP

A

Simple Mail Transport Protocol. Used to send text based information, email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

SNMP

A

Simple Network Management Protocol. Used to collect system information from a remote computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Telnet

A

Used to preform commands on a remote computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Remote Login

A

When someone connects to a computer via the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Application Backdoor

A

Hidden access that provides some level of control of the program

17
Q

SMTP Session Hijacking

A

By gaining access to a list of email addresses a person can send spam to thousands of users

18
Q

Operating Systems Bugs

A

Operating systems backdoors

19
Q

E-mail bombs

A

Large quantity of bulk e-mail that overwhelms and e-mail server preventing user access

20
Q

Macros

A

Tools that allow a user to program repetitive tasks into the computers memory so that they can be quickly accomplished with the touch of a couple keys that the user has selected

21
Q

Spam

A

Unwanted e-mail(usually of a commercial nature sent out in bulk)

22
Q

Redirect Bombs

A

Hackers can use ICMP to change the path information take by sending it a different router

23
Q

Source Routing

A

Technique in which the originator of a packet can attempt to partially or completely control the path through the network to the destination.

24
Q

Proxy Server

A

A server that all computers on the local network have to go through before accessing information on the Internet

25
Q

Adware

A

Any software application that displays advertising banners while the program’s running. Authors may include additional code, which can be viewed thru pop-up windows or a bar that appears on the computer screen. Usually includes code that tracks a user’s personal info & passes it on to 3rd parties, without the user’s authorization or knowledge

26
Q

Alert

A

Notification that a specific attack had been directed at the information system of an organization.

27
Q

Attack

A

Intentional act of attempting to bypass one or more computer security controls.

28
Q

Audit Trial

A

A record showing who has accessed a computer system and what operations he or she has performed during a given period of time. Useful both for maintaining security and for recovering lost translocation a

29
Q

Authenticate

A

To verify the identity of a user, user device, or other entity, or the integrity of data storage, transmitted, or otherwise exposed to unauthorized modification in an information system, or to establish the validity of a transition.

30
Q

Authentication

A

Security measures designed to establish the validity of a transmission, message, or originator, or a means of verifying on individual’s authorization to receive specific categories of information

31
Q

Back Door

A

Hidden software or hardware mechanism used to circumvent security controls

32
Q

Back up

A

A copy of data and or applications contained in the IT store on a magnetic media outside of the IT to be used in the event of IT data loss

33
Q

Blended Threat

A

A computer network attack that seeks to maximize the severity of damage and speed of contagion by combining methods, for example using characteristics of both viruses and worms, while also taking advantage of vulnerabilities and computers, networks, or other physical system. In attack using a blended approach might send the virus via an email attachment, along with a Trojan horse amended any HTML file that will cause damage to the recipient computer.

34
Q

Bots

A

Remote-control Asians installed on your computer often controlled remotely via Internet relay chat once the system is infected, it becomes part of a network and is used in conjunction with other respective members to carry out the wishes of the owner or herder. These games and networks for vulnerabilities, installed various distributed denial of services tools, capture network packets, or download an executive arbitrary program. Computers or systems infected can be used to distribute spam to make a harder track and prosecute the spammers

35
Q

Broadband

A

The general term used to refer to high-speed network connections typically for connections in excess of 1 Megabit Per second to be so name

36
Q

Browser/ browser settings

A

Configuration strategy to Manage The risk associated with active content while still enabling trusted sites

37
Q

Certification

A

The comprehensive evaluation of the technical and non-technical security features of an IT and other safeguards, made in support of the accreditation process, that establishes the extent to which a particular design and implementation met a specified set of security requirement

38
Q

Cipher text

A

For cryptography and which the plain text is made unintelligible to anyone, who interprets it by a transformation of the information itself, based on some key

39
Q

Configuration management

A

The process of keeping track of changes to the system, if needed, improving, approving them.