TUWZ Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

Threat agent

A

Methods and things used to exploit a vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Threat analysis

A

An evaluation of the type, scope and nature of events or actions that can result in adverse consequences; identification of the threats that exist against enterprise assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Threat event

A

Any event during which a threat element/actor acts against an asset in a manner that has the potential to directly result in harm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Threat vector

A

The path or route used by the adversary to gain access to the target

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Threat

A

Anything (e.g., object, substance, human) that is capable of acting against an asset in a manner that can result in harm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Token

A

In security systems, a physical device that is used to authenticate a user, typically in addition to a username and password; in programming languages, a single element of the language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Total cost of ownership (TCO)

A

Includes the original cost of the computer plus the cost of: software, hardware and software upgrades, maintenance, technical support, training, and certain activities performed by users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Transmission Control Protocol (TCP)

A

A connection-based Internet protocol that supports reliable data transfer connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Trusted system

A

A system that employs sufficient hardware and software assurance measures to allow their use for processing a range of sensitive or classified information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Tunneling

A

Commonly used to bridge between incompatible hosts/routers or to provide encryption, a method by which one network protocol encapsulates another protocol within itself.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Two-factor authentication

A

The use of two independent mechanisms for authentication (e.g., requiring a smart card and a password); typically the combination of something you know, are or have

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Uniform resource locator (URL)

A

The string of characters that form a web address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Virtual private network (VPN)

A

A secure private network that uses the public telecommunications infrastructure to transmit data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Virus signature file

A

The file of virus patterns that are compared with existing files to determine whether they are infected with a virus or worm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Virus signature

A

The file of virus patterns that are compared with existing files to determine whether they are infected with a virus or worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Voice-over Internet Protocol (VoIP)

A

Also called IP Telephony, Internet Telephony and Broadband Phone, a technology that makes it possible to have a voice conversation over the Internet or over any dedicated Internet Protocol (IP) network instead of over dedicated voice transmission lines

17
Q

Vulnerability analysis

A

A process of identifying and classifying vulnerabilities

18
Q

Vulnerability

A

A weakness in the design, implementation, operation or internal control of a process that could expose the system to adverse threats from threat events

19
Q

Warm site

A

Similar to a hot site but not fully equipped with all of the necessary hardware needed for recovery

20
Q

Web hosting

A

The business of providing the equipment and services required to host and maintain files for one or more web sites and provide fast Internet connections to those sites.

21
Q

Web server

A

End-point hardware or software that serves web pages to users

22
Q

Wide area network (WAN)

A

A computer network connecting multiple offices or buildings over a larger area

23
Q

Wi-Fi Protected Access II (WPA2)

A

Wireless security protocol that supports 802.11i encryption standards to provide greater security. This protocol uses Advanced Encryption Standards (AES) and Temporal Key Integrity Protocol (TKIP) for stronger encryption.

24
Q

Worm

A

A programmed network attack in which a self-replicating program does not attach itself to programs, but rather spreads independently of users’ action

25
Q

Write blocker

A

A device that allows the acquisition of information on a drive without creating the possibility of accidentally damaging the drive

26
Q

Zero-day exploit

A

A vulnerability that is exploited before the software creator/vendor is even aware of its existence. May also refer to known flaws that do not have a patch available.