100 Flashcards

1
Q

Agreed-upon principles set forth by a company to govern how the employees of that company may use resources such as computers and Internet access

A

acceptable use policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The means of giving or restricting user access to network resources

A

access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A table or data file that specifies whether a user or group has access to a specific resource on a computer or network

A

access control list (ACL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The point at which access to a network is accomplished This term is often used in relation to a wireless access point (WAP)

A

access point (AP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A policy that provides information to the reader about who to contact if a problem is discovered

A

accountability statement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A response generated in real time

A

active response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Any action a user undertakes

A

activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Protocol used to map known IP addresses to unknown physical addresses

A

Address Resolution Protocol (ARP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

An attack that convinces the network that the attacker’s MAC address is the one associated with an allowed address so that traffic is wrongly sent to attacker’s machine

A

Address Resolution Protocol (ARP) poisoning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A control implemented through administrative policies or procedures

A

administrative control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The user who is accountable and responsible for the network

A

administrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A Federal Information Processing Standards (FIPS) publication that specifies a cryptographic algorithm for use by the US government

A

Advanced Encryption Standard (AES)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

More commonly known as ARP poisoning - this involves the MAC (Media Access Control) address of the data being faked

A

ARP spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

An algorithm that uses two keys

A

asymmetric algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Encryption in which two keys must be used

A

asymmetric encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Any unauthorized intrusion into the normal operations of a computer or computer network

A

attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The area of an application that is available to users—those who are authenticated and - more importantly - those who are not

A

attack surface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Minimizing the possibility of exploitation by reducing the amount of code and limiting potential damage

A

attack surface reduction (ASR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The act of tracking resource usage by users

A

audit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

The means of verifying that someone is who they say they are

A

authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A header used to provide connectionless integrity and data origin authentication for IP datagrams and to provide protection against replays

A

Authentication Header (AH)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A type of certificate technology that allows ActiveX components to be validated by a server

A

Authenticode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A utility used with Windows 7 and 8 for creating a copy of the configuration settings necessary to reach the present state after a disaster

A

Automated System Recovery (ASR) disk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

An opening left in a program application (usually by the developer) that allows additional access to data

A

backdoor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
A reversion - or roll back to a previous state - from a change that had negative consequences
backout
26
A usable copy of data made to media
backup
27
A generator that can supply power in the event the primary provider is unable to deliver it
backup generator
28
A documented plan governing backup situations
backup plan
29
A written policy detailing the frequency of backups and the location of storage media
backup policy
30
Looking at the banner - or the header information messages sent with data - to find out about a system(s)
banner grabbing
31
Comparing performance to a historic metric
baselining
32
A host with multiple network interface cards so that it can reside on multiple networks
bastion host
33
A set of rules governing basic operations
best practices
34
Data that is too large to be dealt with by traditional database management means
Big Data analysis
35
A probability method of finding collision in hash functions
birthday attack
36
A Microsoft utility used to encrypt a drive
BitLocker
37
A method of encryption that processes blocks of data rather than streams
block cipher
38
A type of symmetric block cipher created by Bruce Schneier
Blowfish
39
The sending of unsolicited messages over a Bluetooth connection
bluejacking
40
The gaining of unauthorized access through a Bluetooth connection
bluesnarfing
41
A router used to translate from LAN framing to WAN framing
border router
42
An automated software program (network robot) that collects information on the Web
bot
43
A trust model in which a peer-to-peer relationship exists among the root certificate authorities
bridge trust model
44
A type of attack that relies purely on trial and error and tries all possible combinations
brute-force attack
45
A type of denial-of-service (DoS) attack that occurs when more data is put into a buffer than it can hold - thereby overflowing it (as the name implies)
buffer overflow
46
A contingency plan that allows a business to keep running in the event of a disruption to vital resources
business continuity planning (BCP)
47
A study of the possible impact if a disruption to to a business's vital resources were to occur
business impact analysis (BIA)
48
A physical security deterrent used to protect a computer
cable lock
49
An access point that requires users to agree to some condition before they use the network or Internet
captive portal
50
A type of symmetric block cipher defined by RFC 2144
CAST
51
A digital entity that establishes who you are and is often used with e-commerce
certificate
52
An issuer of digital certificates (which are then used for digital signatures or key pairs)
certificate authority (CA)
53
A messaging protocol used between PKI entities
Certificate Management Protocol (CMP
54
The principles and procedures employed in the issuing and managing of certificates
Certificate Practice Statement (CPS)
55
The act of making a certificate invalid
certificate revocation
56
A list of digital certificate revocations that must be regularly downloaded to stay current
certificate revocation list (CRL)
57
A protocol that challenges a system to verify identity
Challenge Handshake Authentication Protocol (CHAP)
58
Management included in the making of a change in the scope of any particular item
change management
59
An algorithm - also known as a cryptographic algorithm - used to encrypt and decrypt data
cipher
60
The part of a client-server network where the computing is usually done
client
61
A surveillance camera used for physical-access monitoring
closed-circuit television (CCTV)
62
Moving the execution of an application to the cloud on an as-needed basis
cloud bursting
63
A model for enabling ubiquitous - convenient - on-demand network access to a shared pool of configurable computing resources"
cloud computing
64
A method of balancing loads and providing fault tolerance
clustering
65
The storage and conditions for release of source code provided by a vendor - partner - or other party
code escrow
66
Looking at all custom written code for holes that may exist
code review
67
Server room aisles that blow cold air from the floor
cold aisles
68
A physical site that can be used if the main site is inaccessible (destroyed) but that lacks all the resources necessary to enable an organization to use it immediately
cold site
69
An agreement between individuals to commit fraud or deceit
collusion
70
A standard identification card used by the Department of Defense(DoD) and other employers
Common Access Card (CAC)
71
A document of specifications detailing security evaluation methods for IT products and systems
Common Criteria (CC)
72
Cloud delivery model in which the infrastructure is shared by organizations with something in common
community cloud
73
A virus that creates a new program that runs in place of an expected program of the same name
companion virus
74
Gap controls that fill in the coverage between other types of vulnerability mitigation techniques (where there are holes coverage - we compensate for them
compensating controls
75
A formalized or an ad hoc team you can call upon to respond to an incident after it arises
Computer Security Incident Response Team (CSIRT)
76
Type of communications between two hosts that have a previous session established for synchronizing sent data
connection-oriented protocol
77
A plan that allows a business to keep running in the event of a disruption to vital resources
contingency plan
78
Processes or actions used to respond to situations or events
control
79
Technical or administrative measures in place to assist with resource management
control types
80
A plain-text file stored on your machine that contains information about you (and your preferences) and is used by a server
cookie
81
A wrapper that uses 128-bit AES encryption with a 48-bit initialization vector
Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP)
82
Functions on which the livelihood of the company depends
critical business functions (CBF)
83
A form of web-based attack in which unauthorized commands are sent from a user that a website trusts
Cross-Site Request Forgery (XSRF)
84
Running a script routine on a user's machine from a website without their permission
cross-site scripting (XSS)
85
The study and practice of finding weaknesses in ciphers
cryptanalysis
86
A person who does cryptanalysis
cryptanalyst
87
A person who participates in the study of cryptographic algorithms
cryptographer
88
An algorithm - also known as a cipher - used to encrypt and decrypt data
cryptographic algorithm
89
The field of mathematics focused on encrypting and decrypting data
cryptography
90
Getting rid of/destroying media no longer needed
data disposal
91
The primary standard used in government and industry until it was replaced by AES
Data Encryption Standard (DES)
92
Any systems that identify - monitor - and protect data to prevent it from unauthorized use - modification - or destruction"
data loss prevention (DLP)
93
A policy dealing with some aspect of data (usage - destruction - retention - etc
data policy
94
A response that fools the attacker into thinking that the attack is succeeding while the system monitors the activity and potentially redirects the attacker to a system that is designed to be broken
deception active response
95
An area for placing web and other servers outside the firewall
demilitarized zone (DMZ)
96
A type of attack that prevents any users—even legitimate ones— from using a system
denial-of-service (DoS)
97
Reviewing the security design - including examining the ports and protocols used - the rules - segmentation - and access control
design review
98
Controls that are intended to identify and characterize an incident in progress (for example - sounding the alarm and altering the administrator)
detective control
99
The act of attempting to crack passwords by testing them against a list of dictionary words
dictionary attack
100
A type of backup that includes only new files or files that have changed since the last full backup
differential backup