vocabularyB Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

Badge

A

A device used for identification or authentication. A badge can be electronic or standard.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Baseband

A

A digital LAN signaling type in which the entire media is filled with one signal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Bastion Host

A

A device that acts as a host and provides packet filtering and proxy services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

BCP

A

Business continuity plan is a plan ensuring that the business can continue in the event of an interruption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Bell-LaPadula Model

A

A security model presented in the 1970s by the US Department of Defense. It was designed specifically to protect classified information and addresses data confidentiality only. This model supports multiple states and transitions between states.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Biba Model

A

Security model designed to address data integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Biometrics

A

The most expensive and secure authentication type that uses physical characteristics to authenticate a person. Biometrics use characteristics such as retina and iris scans, fingerprint and handprint characteristics, voice patterns, keystroke patterns, and signatures to authenticate a subject.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Birthday

A

A type of attack which attempts to find different messages that produce the same digest.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Block Cipher

A

A category of cipher in which the cipher works on a section of plaintext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Blowfish

A

A symmetric cryptographic algorithm standard developed as an alternative to DES and IDEA. Blowfish operates on 64-bit blocks and the key varies from 32 bits to 446 bits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Boot Sector Infector

A

A virus that infects the Master Boot Record or the Boot Sector of a computers boot device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

BRI

A

The Basic Rate Interface is an ISDN type that includes two 64-KB channels and one 16-KB channel. The 64-KB channels transmit all digital, audio, and video and the 16-KB channel is for purely digital transfer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Bridge

A

A network connection device that forwards data packets based on the MAC address included in the frame. A bridge uses the data-link layer of the ISO/OSI reference model.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Broadband

A

An analog LAN signaling type commonly used for cable TV in which multiple communication channels may be used simultaneously by transmitting channels on a carrier.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Brute Force Attack

A

An attack that attempts to gain access many times using different input types. Examples of brute force attacks are password guessing and war dialing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Buffer Overflow

A

A type of security attack which sends large amounts of data to the buffer, causing it to overflow into adjacent buffers therefore causing corruption. The data sent includes codes that damage the files, change data, or disclose information.

17
Q

Bus Topology

A

A LAN topology with a single high-speed wire that all nodes are connected to and messages travel through. All nodes are connected to the shared media, often called a backbone or bus.

18
Q

Business Attack

A

A type of attack that attempts to acquire sensitive information from a commercial organization in order to harm a person or organization.

19
Q

Business Impact Analysis

A

The step in planning a BCP that identifies critical resources and the threats to those resources.