vocabularyU2Z Flashcards

2
Q

Unclassified

A

Information that anyone can get to and that is largely available on Web sites or to the media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

USA PATRIOT Act

A

A law enacted by the U.S. government in direct response to the 9/11 terrorist attack. This law broadened the authority of law enforcement and intelligence agencies to conduct electronic monitoring. Monitoring permissions are now granted per person instead of per circuit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

User Mode

A

The basic operating mode when executing user programs. In this mode only a subset of the full instruction set is available, and the CPU provides protection from faulty or malicious code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

UTP

A

The unshielded twisted pair is a twisted pair in which each pair is insulated, then each pair is twisted into a package which is again insulated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Virtual Memory

A

A memory address space that exceeds the available physical memory. Virtual memory is implemented by using secondary storage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Virtual Memory

A

The concept that allows programs to address memory spaces larger than physical memory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Virus

A

An intrusive program that intentionally or unintentionally inserts copies of itself into other computer files. The virus infects additional files because the copies are executed when the file loads into memory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Virus Writer

A

A very talented programmer who writes code to exploit a vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Volatile Memory

A

Memory whose contents are lost when the power is cut to the system, such as RAM.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

VPN

A

A virtual private network is a network created by using public wires to connect computers and other nodes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Vulnerability

A

Any weakness in a system or organization that could allow a threat to be realized.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

WAN

A

Wide area network is a data network that covers a broad geographic area.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

War Dialer

A

A computer program built to seek modems by dialing continuous phone numbers. War Dialers are built to find vulnerable computer systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Warm Site

A

A data center alternative facility with utilities, basic computer hardware, and possibly OS and software. It is more expensive than a cold site, but takes only about 12 hours to become fully functional.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Wireless

A

A technology type that provides networking without the use of physical wires. It allows connection through transmission or radio frequency medium.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Worm

A

Similar to a virus, except a worm is a standalone program enabling it to exist without a host.

18
Q

XOR

A

Exclusive OR is a binary math operator used in cryptography. XOR states that one of the input values is a one, but not the other.