Vocabulary Flashcards

Definitions

1
Q

A block cipher type of encryption considered to be less vulnerable than DES.

A

3DES (Triple Data Encryption Standard)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The act of restricting both physical, file and server access so those who need it have it, but those who don’t need it do not have it.

A

Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The process of preventing an account from logging on after a number of incorrect log on attempts

A

Account Lockout

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A directory service used in a Windows domain to store and administer users, groups, printers, devices, and other objects.

A

Active Directory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A type of share that is only accessible by administrators, backup operators, and server operators.

A

Administrative Shares

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A form of malware which displays advertisements while an app is being used.

A

Adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A block cipher type of encryption which comes in 128, 192, and 256 bits

A

AES (Advance Encryption Standard)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Files that are copies of files from network drives.

A

Antispam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A firewall filtering method which analyzes data at layer 5 (the session layer) of the OSI model.

A

Application-Level Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

An impostor-like misuse of a network protocol for the purpose of attacking a network.

A

ARP Spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A type of encryption in which one key encrypts data and the other key decrypts data.

A

Asymmetric Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

the totality of ways in which a system can be attacked.

A

Attack Surface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A mechanism by which a log tracks who has logged on to a system and what has been accessed on the system.

A

Auditing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The act of verifying identification to a application or a system

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

the part of the CIA triangle that ensured data is accessible by those who need it, when they need it.

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Malware used to do unauthorized tasks on a system through an opening in the system.

A

Backdoor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A certificate type which support storage of a single certificate.

A

Base-64-Encoded X.509

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The for of authentication that uses devices such as retina scanners, voice recognition, fingerprint scanners, or facial recognition for authentication.

A

Biometrics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

An encryption system which encrypts entire dives.

A

BitLocker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A type of encryption system which encrypt removable hard drives.

A

BitLocker To Go

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

a block of plain text plus a key to encrypt the block of text.

A

Block Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

An Attack in which all possible combinations of characters are used in an attempt to crack a password.

A

Brute Force Attack

23
Q

An overloading of a reserved space of data, this causes the system to slow down, freeze, or crash.

A

Buffer Overflow

24
Q

A server or third-party entity used to issue digital certificates

A

CA ( Certificate Authority)

25
A challenge-response authentication protocol which uses MD5 hashing
CHAP (Challenge Handshake Authentication Protocol)
26
the combination of confidentiality, integrity, and availability as it relate to securing data systems.
CIA Triangle
27
A filtering mechanism in which data packets are filtered by port and/or protocol.
Circuit Filtering
28
The act of keeping data and systems secure from unauthorized access.
Confidentiality
29
A piece of text which stores information, site preference, and shopping cart contents.
Cookie
30
Used to store certificates that have been revoked due to expiration or being compromised.
CRL (Certificate Revocation List)
31
An attack in which data on a network is captured and then resent.
Cross-site Scripting Attack
32
An attack in which a network is disrupted to the point to where they cannot function.
DDoS (Denial of Service) Attack
33
Security through layers of a building, such as the external perimeter, the physical doors, and the internal part of a building.
Defense in Depth
34
the act of passing control of a resource (such as an organizational unit) from one entity to another.
Delegation
35
Encoded binary X.509 certificates which do not support private key storage.
DES (Data Encryption Standard)
36
A tool which uses code integrity policies to lock devices to only run trusted apps.
Device Guard
37
a type of certificate used to store public keys and information such as user, organization, serial number, and expiration date.
Digital Certificate
38
A certificate which is used to verify authenticity of a document or email message.
Digital Signature
39
A computer which becomes part of Botnet and helps carry out DDoS
DNS Poisoning
40
A form of spoofing in which MAC address/IP address combinations are compromised through stealing the IP address of a host and then using that to force traffic to an attacking machine.
DNS Spoofing
41
A mechanism used to securely transmit data over part of a VPN connection.
DNSSEC
42
A tool sued to capture network packets on connected ports. this can be used for analysis or for hacking.
DoS Attack
43
A form of NAT which maps one private IP address to one public IP address.
Dynamic NAT
44
the cumulative total of inherited and explicit permissions given to a user or group on a resource.
Effective Permissions
45
A Windows encryption mechanism which encrypts file and folders
EFS (Encrypting File system)
46
An attack in which a virus or worm takes advantage of a software vulnerability.
Email Bombing
47
the adding of a cipher text to data to scramble the data to make it unreadable without a decryption key.
Encryption
48
An attack of an IP address to where a source IP is forged.
ESP
49
A Windows tool used store and present application, security, and system logs, all for the purpose of information and troubleshooting.
Event Viewer.
50
Permissions which are granted to a user or group by an administrator.
Explicit Permissions
51
The entry area to a building and the immediate area outside of the building
External Perimeter
52
A network security system and/or hardware device which controls any incoming and outgoing network traffic based on a set of rules provided by an administrator.
Firewall
53
A Windows tool which is used to control rights for users, groups, and organizational units.
Group Policies
54
A concept by which multiple services are installed across multiple servers.
Hash Function