Glossary- H Flashcards

1
Q

hacker

A

Someone who interferes with or accesses another’s computer without
authorization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

hardening

A

The technique of configuring a system so that only its essential services and features are active and all others are deactivated. This helps to reduce the “attack surface” of a system to only its essential components.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

hardware monitoring

A

Tools and processes used to continuously observe the health, performance, and capacity of one or more computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

hash function

A

A cryptographic operation on a block of data that returns a fixed- length string of characters, used to verify the integrity of a message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

heating, ventilation, and air conditioning (HVAC)

A

A system that controls tempera- ture and humidity in a facility.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

hierarchical file system (HFS)

A

A file system used on computers running the Mac OS operating system. See also file system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

honeynet

A

A network of computers that is acting as a honeypot. See also honeypot.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

honeypot

A

A trap that is designed to detect unauthorized use of information systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

host-based intrusion detection system (HIDS)

A

An intrusion detection system (IDS) that is installed on a system and watches for anomalies that could be signs of intrusion. See also intrusion detection system (IDS).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

hot site

A

An alternate processing center where backup systems are already running and in some state of near-readiness to assume production workload. The systems at a hot site most likely have application software and database management software already loaded and running, perhaps even at the same patch levels as the systems in the pri- mary processing center.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

hub

A

An Ethernet network device that is used to connect devices to the network. A hub can be thought of as a multiport repeater.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

humidity

A

The amount of water moisture in the air.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Hypertext Transfer Protocol (HTTP)

A

A TCP/IP application layer protocol used to transmit webpage contents from web servers to users who are using web browsers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Hypertext Transfer Protocol Secure (HTTPS)

A

A TCP/IP application layer protocol that is similar to HTTP in its use for transporting data between web servers and brows- ers. HTTPS is not a separate protocol, but instead is the instance where HTTP is en- crypted with SSL or TLS. See also Hypertext Transfer Protocol (HTTP), Secure Sockets Layer (SSL), and Transport Layer Security (TLS).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

hypervisor

A

Virtualization software that facilitates the operation of one or more vir- tual machines.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly