200 Flashcards
An asymmetric standard for exchanging keys
Diffie-Hellman key exchange
An asymmetrically encrypted signature whose sole purpose is to authenticate the sender
digital signature
An attack that involves navigating to other directories and gaining access to files/directories that would be otherwise restricted
directory traversal attack
The act of recovering data following a disaster that has destroyed it
disaster recovery
A plan outlining the procedure by which data is recovered after a disaster
disaster-recovery plan
A method of restricting access to objects based on the identity of the subjects or the groups to which they belong
Discretionary Access Control (DAC)
Technology that uses two controllers and two disks to keep identical copies of data to prevent the loss of data if one disk fails
disk duplexing
Technology that keeps identical copies of data on two disks to prevent the loss of data if one disk fails
disk mirroring
Technology that enables writing data to multiple disks simultaneously in small portions called stripes
disk striping
A fault-tolerance solution of writing data across a number of disks and recording the parity on another (also known as disk striping with a parity disk) In the event that any of disk fails - the data on it can be re-created by looking at the remaining data and computing parity to figure out the missing data
disk striping with parity
A derivative of a DoS attack in which multiple hosts in multiple locations all focus on one target to reduce its availability to the public
distributed denial-of-service (DDoS)
An attack method in which a daemon caches DNS reply packets - which sometimes contain other information (data used to fill the packets) The extra data can be scanned for information useful in a brea-in or man-in-the-middle attack
DNS poisoning
The DNS server is given information about a name server that it thinks is legitimate when it isn’t
DNS spoofing
The network service used in TCP/IP networks that translates hostnames to IP addresses
Domain Name System (DNS)
A host that resides on more than one network and possesses more than one physical network card
dual-homed firewall
Looking through trash for clues—often in the form of paper scraps—to find users’ passwords and other pertinent information
dumpster diving
A protocol used on a TCP/IP network to send client configuration data - including IP address - default gateway - subnet mask - and DNS configuration - to clients
Dynamic Host Configuration Protocol (DHCP)
The IEEE standard that defines port-based security for wireless network access control
EAP over LAN (EAPOL)
Dynamic provisioning of resources as needed
elasticity
The interference that can occur during transmissions over copper cable because of electromagnetic energy outside the cable
electromagnetic interference (EMI)
A device that identifies you electronically in the same way as the cards you carry in your wallet
electronic wallet
A type of public key cryptosystem that requires a shorter key length than many other cryptography systems (including the de facto industry standard - RSA)
Elliptic Curve Cryptography (ECC)
A header used to provide a mix of security services in IPv4 and IPv6
Encapsulating Security Payload (ESP)
The process of enclosing data in a packet
encapsulation