Vocabulary Flashcards

Definitions

1
Q

A block cipher type of encryption considered to be less vulnerable than DES.

A

3DES (Triple Data Encryption Standard)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The act of restricting both physical, file and server access so those who need it have it, but those who don’t need it do not have it.

A

Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The process of preventing an account from logging on after a number of incorrect log on attempts

A

Account Lockout

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A directory service used in a Windows domain to store and administer users, groups, printers, devices, and other objects.

A

Active Directory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A type of share that is only accessible by administrators, backup operators, and server operators.

A

Administrative Shares

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A form of malware which displays advertisements while an app is being used.

A

Adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A block cipher type of encryption which comes in 128, 192, and 256 bits

A

AES (Advance Encryption Standard)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Files that are copies of files from network drives.

A

Antispam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A firewall filtering method which analyzes data at layer 5 (the session layer) of the OSI model.

A

Application-Level Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

An impostor-like misuse of a network protocol for the purpose of attacking a network.

A

ARP Spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A type of encryption in which one key encrypts data and the other key decrypts data.

A

Asymmetric Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

the totality of ways in which a system can be attacked.

A

Attack Surface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A mechanism by which a log tracks who has logged on to a system and what has been accessed on the system.

A

Auditing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The act of verifying identification to a application or a system

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

the part of the CIA triangle that ensured data is accessible by those who need it, when they need it.

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Malware used to do unauthorized tasks on a system through an opening in the system.

A

Backdoor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A certificate type which support storage of a single certificate.

A

Base-64-Encoded X.509

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The for of authentication that uses devices such as retina scanners, voice recognition, fingerprint scanners, or facial recognition for authentication.

A

Biometrics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

An encryption system which encrypts entire dives.

A

BitLocker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A type of encryption system which encrypt removable hard drives.

A

BitLocker To Go

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

a block of plain text plus a key to encrypt the block of text.

A

Block Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

An Attack in which all possible combinations of characters are used in an attempt to crack a password.

A

Brute Force Attack

23
Q

An overloading of a reserved space of data, this causes the system to slow down, freeze, or crash.

A

Buffer Overflow

24
Q

A server or third-party entity used to issue digital certificates

A

CA ( Certificate Authority)

25
Q

A challenge-response authentication protocol which uses MD5 hashing

A

CHAP (Challenge Handshake Authentication Protocol)

26
Q

the combination of confidentiality, integrity, and availability as it relate to securing data systems.

A

CIA Triangle

27
Q

A filtering mechanism in which data packets are filtered by port and/or protocol.

A

Circuit Filtering

28
Q

The act of keeping data and systems secure from unauthorized access.

A

Confidentiality

29
Q

A piece of text which stores information, site preference, and shopping cart contents.

A

Cookie

30
Q

Used to store certificates that have been revoked due to expiration or being compromised.

A

CRL (Certificate Revocation List)

31
Q

An attack in which data on a network is captured and then resent.

A

Cross-site Scripting Attack

32
Q

An attack in which a network is disrupted to the point to where they cannot function.

A

DDoS (Denial of Service) Attack

33
Q

Security through layers of a building, such as the external perimeter, the physical doors, and the internal part of a building.

A

Defense in Depth

34
Q

the act of passing control of a resource (such as an organizational unit) from one entity to another.

A

Delegation

35
Q

Encoded binary X.509 certificates which do not support private key storage.

A

DES (Data Encryption Standard)

36
Q

A tool which uses code integrity policies to lock devices to only run trusted apps.

A

Device Guard

37
Q

a type of certificate used to store public keys and information such as user, organization, serial number, and expiration date.

A

Digital Certificate

38
Q

A certificate which is used to verify authenticity of a document or email message.

A

Digital Signature

39
Q

A computer which becomes part of Botnet and helps carry out DDoS

A

DNS Poisoning

40
Q

A form of spoofing in which MAC address/IP address combinations are compromised through stealing the IP address of a host and then using that to force traffic to an attacking machine.

A

DNS Spoofing

41
Q

A mechanism used to securely transmit data over part of a VPN connection.

A

DNSSEC

42
Q

A tool sued to capture network packets on connected ports. this can be used for analysis or for hacking.

A

DoS Attack

43
Q

A form of NAT which maps one private IP address to one public IP address.

A

Dynamic NAT

44
Q

the cumulative total of inherited and explicit permissions given to a user or group on a resource.

A

Effective Permissions

45
Q

A Windows encryption mechanism which encrypts file and folders

A

EFS (Encrypting File system)

46
Q

An attack in which a virus or worm takes advantage of a software vulnerability.

A

Email Bombing

47
Q

the adding of a cipher text to data to scramble the data to make it unreadable without a decryption key.

A

Encryption

48
Q

An attack of an IP address to where a source IP is forged.

A

ESP

49
Q

A Windows tool used store and present application, security, and system logs, all for the purpose of information and troubleshooting.

A

Event Viewer.

50
Q

Permissions which are granted to a user or group by an administrator.

A

Explicit Permissions

51
Q

The entry area to a building and the immediate area outside of the building

A

External Perimeter

52
Q

A network security system and/or hardware device which controls any incoming and outgoing network traffic based on a set of rules provided by an administrator.

A

Firewall

53
Q

A Windows tool which is used to control rights for users, groups, and organizational units.

A

Group Policies

54
Q

A concept by which multiple services are installed across multiple servers.

A

Hash Function