200 Flashcards

1
Q

An asymmetric standard for exchanging keys

A

Diffie-Hellman key exchange

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An asymmetrically encrypted signature whose sole purpose is to authenticate the sender

A

digital signature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An attack that involves navigating to other directories and gaining access to files/directories that would be otherwise restricted

A

directory traversal attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The act of recovering data following a disaster that has destroyed it

A

disaster recovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A plan outlining the procedure by which data is recovered after a disaster

A

disaster-recovery plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A method of restricting access to objects based on the identity of the subjects or the groups to which they belong

A

Discretionary Access Control (DAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Technology that uses two controllers and two disks to keep identical copies of data to prevent the loss of data if one disk fails

A

disk duplexing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Technology that keeps identical copies of data on two disks to prevent the loss of data if one disk fails

A

disk mirroring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Technology that enables writing data to multiple disks simultaneously in small portions called stripes

A

disk striping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A fault-tolerance solution of writing data across a number of disks and recording the parity on another (also known as disk striping with a parity disk) In the event that any of disk fails - the data on it can be re-created by looking at the remaining data and computing parity to figure out the missing data

A

disk striping with parity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A derivative of a DoS attack in which multiple hosts in multiple locations all focus on one target to reduce its availability to the public

A

distributed denial-of-service (DDoS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

An attack method in which a daemon caches DNS reply packets - which sometimes contain other information (data used to fill the packets) The extra data can be scanned for information useful in a brea-in or man-in-the-middle attack

A

DNS poisoning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The DNS server is given information about a name server that it thinks is legitimate when it isn’t

A

DNS spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The network service used in TCP/IP networks that translates hostnames to IP addresses

A

Domain Name System (DNS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A host that resides on more than one network and possesses more than one physical network card

A

dual-homed firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Looking through trash for clues—often in the form of paper scraps—to find users’ passwords and other pertinent information

A

dumpster diving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A protocol used on a TCP/IP network to send client configuration data - including IP address - default gateway - subnet mask - and DNS configuration - to clients

A

Dynamic Host Configuration Protocol (DHCP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The IEEE standard that defines port-based security for wireless network access control

A

EAP over LAN (EAPOL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Dynamic provisioning of resources as needed

A

elasticity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

The interference that can occur during transmissions over copper cable because of electromagnetic energy outside the cable

A

electromagnetic interference (EMI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A device that identifies you electronically in the same way as the cards you carry in your wallet

A

electronic wallet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A type of public key cryptosystem that requires a shorter key length than many other cryptography systems (including the de facto industry standard - RSA)

A

Elliptic Curve Cryptography (ECC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A header used to provide a mix of security services in IPv4 and IPv6

A

Encapsulating Security Payload (ESP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

The process of enclosing data in a packet

A

encapsulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
The process of converting data into a form that makes it less likely to be suable to anyone intercepting it if they cant decrypt it
encryption
26
A string of alphanumeric characters used to decrypt encrypted data
encryption key
27
The process of luring someone
enticement
28
The process of encouraging an attacker to perform an act - even if they don't want to do it
entrapment
29
A key that exists only for that session
ephemeral key
30
The act of moving something up in priority
escalation
31
A level of assurance - expressed as a numeric value - based on standards set by the Common Criterion Recognition Agreement (CCRA)
evaluation assurance levels (EALs)
32
Any noticeable action or occurrence
event
33
A statement that differs from the norm
exception statement
34
An authentication protocol used in wireless networks and point-to-point connections
Extensible Authentication Protocol (EAP)
35
The process of reconstructing a system or switching over to other systems when failure is detected
failover
36
An event that should be flagged but isn't
false negative
37
A flagged event that isn't really an event and has been falsely triggered
false positive
38
An electrically conductive wire mesh or other conductor woven into a "cage" that surrounds a room and prevents electromagnetic signals from entering or leaving the room through the walls
Faraday cage
39
The ability to withstand a fault (failure) without losing data
fault tolerance
40
A networking protocol that is not routable at the IP layer and thus cannot work across large networks
FCoE (Fibre Channel over Ethernet)
41
A set of guidelines for US federal government information systems
Federal Information Processing Standard (FIPS)
42
A means of linking a user's identity with their privileges in a manner that can be used across business boundaries
federated identity
43
A collection of computer networks that agree on standards of operation - such as security standards
federation
44
A high-speed networking technology
Fibre Channel
45
Microsoft's earliest filesystem
File Allocation Table (FAT)
46
TCP/IP and software that permit transferring files between computer systems and use cleartext passwords
File Transfer Protocol (FTP)
47
The act of stopping a fire and preventing it from spreading
fire suppression
48
A combination of hardware and software that protects a network from attack by hackers who could gain access through public networks - including the Internet
firewall
49
A system that is up and running at least 99.999 percent of the time
five nines availability
50
The process of systematically identifying the network and its security posture
footprinting
51
In terms of security - the act of looking at all the data at your disposal to try to figure out who gained unauthorized access and the extent of that access
forensics
52
A property of any key exchange system that ensures that if one key is compromised - subsequent keys will not also be compromised
forward secrecy
53
A secure form of FTP
FTP over SSL (FTPS)
54
A concept that works on the assumption that any information created on any system is stored forever
Full Archival method
55
A backup that copies all data to the archive medium
full backup
56
An information classification stating that the data so classified is available to anyone
full distribution
57
A technique of penetration testing
fuzzing
58
Vulnerability possible when the interconnection between the WAP server and the Internet isnt encrypted and packets between the devices may be intercepted
gap in the WAP
59
One of the most popular methods of backup tape rotation
Grandfather - Father - Son method
60
Virtual machines running on a physical machine
guests
61
Rules - policies - or procedures that are advisory or nonmandatory
guidelines
62
The process of making certain that an entity (such as an operating system or application) is as secure as it can be
hardening
63
A system that bases actions on the heuristics it observes
heuristic system
64
A newer backup type that provides continuous online backup by using optical or tape jukeboxes
hierarchical storage management (HSM)
65
A trust model - also known as a tree - in which a root CA at the top provides all of the information
hierarchical trust model
66
A clustering solution to provide resource reliability and availability
high availability (HA)
67
A mechanism for message authentication using cryptographic hash functions per the draft of the Federal Information Processing Standards (FIPS) publication
HMAC (Hash-Based Message Authentication Code)
68
Typically an email message warning of something that isn't true - such as an outbreak of a new virus
hoax
69
A bogus system set up to attract and slow down a hacker
honeypot
70
Any network device with a TCP/IP network address or physical machines running virtual machines
host
71
An intrusion detection system that is host based
host-based IDS (HIDS)
72
A server room aisle that removes hot air
hot aisles
73
A location that can provide operations within hours of a failure
hot site
74
Another word for a patch
hotfix
75
A cryptoprocessor chip (or circuit mounted within the computer) that can be used to enhance security and is commonly used with PKI systems
HSM (Hardware Security Module)
76
A combination of HTTP with Secure Sockets Layer (SSL) that results in a secure connection It uses port 443 by default
HTTP Secure (HTTPS
77
A password attack that uses a combination of dictionary entries and brute force
hybrid attack
78
Cloud delivery model that combines other types
hybrid cloud
79
A trust model that can use the capabilities of any or all of the structures of other trust models
hybrid trust model
80
A set of codes used to format text and graphics that will be displayed in a browser
Hypertext Markup Language (HTML)
81
The protocol used for communication between a web server and a web browser
Hypertext Transfer Protocol (HTTP)
82
Also known as HTTPS and HTTP Secure
Hypertext Transport Protocol over SSL (HTTPS)
83
The software that allows virtual machines to exist
hypervisor
84
The process of proofing invoked when a person claims that they are the user but cannot be authenticated - such as when they lose their password
identity proofing
85
Pretending to be another to gain information
impersonation
86
A condition that states that unless otherwise given - the permission will be denied
implicit deny
87
An attempt to violate a security policy - a successful penetration - a compromise of a system - or unauthorized access to information
incident
88
How an organization responds to an incident
incident response
89
A policy that defines how an organization will respond to an incident
incident response plan (IRP)
90
A type of backup in which only new files or files that have changed since the last full backup or the last incremental backup are included
incremental backup
91
The process of determining what information is accessible to what parties and for what purposes
information classification
92
A model of cloud computing that utilizes virtualization; clients pay an outsourcer for the resources used
Infrastructure as a Service (IaaS)
93
Immediate communication that can be sent back and forth between users who are currently logged on
instant messaging (IM)
94
An international organization that sets standards for various electrical and electronics issues
Institute of Electrical and Electronics Engineers (IEEE)
95
Putting too much information into too small of a space that has been set aside for numbers
integer overflow
96
An obstruction to the signal
interference
97
An information classification stating that the data so classified is limited to internal employees only
internal information
98
An algorithm that uses a 128-bit key
International Data Encryption Algorithm (IDEA)
99
Organization responsible for communications standards - spectrum management and the development of communications infrastructures in underveloped nations
International Telecommunications Union (ITU)
100
The organization responsible for governing IP addresses; its website is www
Internet Assigned Numbers Authority (IANA)