1-3 Flashcards

1
Q

a check of a systems security, usually including a review of documents, procedures, and system configurations

A

auditing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

the process of verifying that a user is authorized to access some resource

A

authenticate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

numbers that use the base 2 number system

A

binary numbers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

a hacker with a malicious purpose, synonymous with a cracker

A

black hat hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

the act of preventing transmissions of some type

A

blocking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

to successfully break into a system

A

breach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

an attack that seeks to overwrite a memory buffer with more data than it is designed to hold

A

buffer overflow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

an approach to security that is proactive rather than reactive

A

dynamic security approach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

one who hacks into systems in order to accomplish some goal that he or she feels is ethically valid

A

ethical hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

a security approach that also secures the internal components of the network, not just the perimeter

A

layered security approach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

any software that has a malicious purpose such as a virus or trojan horse

A

malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

network interface card

A

nic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

the process of verifying a connection so that neither party can later deny, or reupdate, the transaction

A

non-repudation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly