300 Flashcards

(100 cards)

1
Q

A message and management protocol for TCP/IP

A

Internet Control Message Protocol (ICMP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An international organization that works under the Internet Architecture Board to establish standards and protocols relatings to the Internet

A

Internet Engineering Task Force (IETF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The network layer responsible for routing - IP addressing - and packaging

A

Internet layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A protocol with a store-and-forward capability

A

Internet Message Access Protocol (IMAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The protocol in the TCP/IP suite responsible for network addressing

A

Internet Protocol (IP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A set of protocols that enable encryption - authentication - and integrity over IP

A

Internet Protocol Security (IPSec)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A professional membership group composed primarily of Internet experts

A

Internet Society (ISOC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The act of entering a system without authorization to do so

A

intrusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Tools that identify and respond to attacks using defined rules or logic

A

intrusion detection system (IDS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Penetration-type testing that involves trying to break into the network

A

intrusive tests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Making the data look as if it came from a trusted host when it didn’t (thus spoofing the IP address of the sending host)

A

IP spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A protocol that enables the creation of storage area networks (SANs) and is used in sending storage-related commands over IP networks

A

iSCSI (Internet Small Computer Systems Interface)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

An attack that involves looking at repeated results in order to crack the WEP secret key

A

IV attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Purposely obstructing or interfering with a signal

A

jamming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A policy of rotating employees through various jobs

A

job rotation policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The ability of a filesystem to use a log file of all changes and transactions that have occurred within a set period of time (for example - the last few houres) If a crash occurrs - the operating system can look at the log files to see what transactions have been committed and which ones have not

A

journaling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

An authentication scheme that uses tickets (unique keys) embedded within messages

A

Kerberos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A principle that states that the security of an algorithm should depend only on the secrecy of the key and not on the secrecy of the algorithm itself

A

Kerckhoffs’s principle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

An organization or facility that generates keys for users and is a part of Kerberos

A

key distribution center (KDC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

An agency that stores keys for the purpose of law-enforcement access

A

key escrow agency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A method of offering mutual authentication and establishing data encryption keys

A

Key Exchange Algorithm (KEA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

The act of creating keys for use by users

A

key generation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

The temporary deferment of a key for a period of time (such as for a leave of absence

A

key suspension

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

The wait time between the call for an action or activity and the actual execution of that action

A

latency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
The concept that access differs at different levels
lattice-based control
26
A tunneling protocol often used with virtual private networks (VPNs) L2F was developed by Cisco
Layer 2 Forwarding (L2F)
27
A tunneling protocol that adds functionality to the Point-to-Point (PPP) This protocol was created by Microsoft and Cisco - and it is often used with virtual private networkds (VPNs)
Layer 2 Tunneling Protocol (L2TP)
28
Exploiting weaknesses in LDAP (Lightweight Directory Access Protocol) Implementations by not properly filtering input
LDAP injection attack
29
A permission method in which users are granted only the privileges necessary to perform their job function
least privilege
30
The policy of giving a user only the minimum permissions needed to do the work that must be done
least privilege policy
31
A set of protocols that was derived from x
Lightweight Directory Access Protocol (LDAP)
32
An authentication protocol created by Cisco as an extension to EAP
Lightweight Extensible Authentication Protocol (LEAP
33
Assigning a quantitative number to the chance that something will occur
likelihood
34
Limiting network access to a list of the MAC addresses associated with known users computers
MAC filtering
35
A software exploitation virus that works by using the macro feature included in many applications - such as Microsoft Office
macro virus
36
Any code that is meant to do harm
malicious code
37
A threat from someone inside the organization intent on doing harm
malicious insider threat
38
A security policy in which labels are used to identify the sensitivity of objects
Mandatory Access Control
39
A policy requiring earned vacation time be used or lost
mandatory vacation policy
40
An attack that occurs when someone/something that is trusted intercepts packets and retransmits them to another party
man-in-the-middle
41
A device - such as a small room - that limits access to one or a few individuals
mantrap
42
The measurement of the anticipated incidence of failure of a system or component
mean time between failures (MTBF)
43
The measurement of the average of how long it takes a system or compnent to fail
mean time to failure (MTTF)
44
The measurement of how long it takes to repair a system or component once a failure occurs
mean time to restore (MTTR)
45
A sublayer of the Data Link layer of the Open Systems Interconection (OSI) model that controls the way multiple devices use the same media channel
Media Access Control (MAC)
46
A trust model that expands the concepts of the bridge model by supporting multiple paths and multiple root certificate authorities
mesh trust model
47
A common method of verifying integrity
Message Authentication Code (MAC)
48
The cryptographic hash containing a string of digits within a message
message digest
49
In a three-tier database model - this server accepts requests from clients - evaluates them - and then sends them on to the database server for processing
middle-tier server
50
An intrusion detection system that works by detecting misuse
misuse-detection IDS (MD-IDS)
51
Residing on more than one network
multihomed
52
A virus that attacks a system in more than one way
multipartite virus
53
Whenever two or more parties authenticate each other
mutual authentication
54
An agency (formerly known as the National Bureau of Standards [NBS]) that has been involved in developing and supporting standards for the US government for over 100 years
National Institute of Standards and Technology (NIST)
55
The US government agency responsible for protecting US communications and producing foreign intelligence information
National Security Agency (NSA
56
An organization with the purpose of collecting "known - traceable software applications" through their hash values and storing them in a Reference Data Set (RDS) for law enforcement
National Software Reference Library (NSRL
57
Technology that requires a user to bring the client close to the AP in order to verify (often through the RFID or Wi-Fi) that the device is present
near field communication (NFC)
58
An early networking protocol from Microsoft
NetBIOS
59
The set of standards defined by the network for clients attempting to access it
network access control (NAC)
60
A server that acts as a go-between for clients accessing the Internet
Network Address Translation (NAT)
61
The protocol Point-to-Point Protocol (PPP) employs for encapsulating network traffic
Network Control Protocol (NCP)
62
An intrusion prevention system that is network based
network intrusion prevention system (NIPS)
63
Another term for MAC filtering
network lock
64
An approach to an intrusion detection system (IDS) - it attaches the system to a point in the network where it can monitor and report on all network traffic
network-based IDS (NIDS)
65
Penetration/vulnerability testing that takes a passive approach rather than actually trying to break into the network
nonintrusive tests
66
Making sure the sender can't repudiate (dispute) sending the data
nonrepudiation
67
A database that is not a relational database and does not use SQL
NoSQL database
68
Storing data off the premise - usually in a secure location
offsite storage
69
An antenna type that receives a signal from all directions
omnidirectional
70
A database model in which the database and the application exist on a single system
one-tier model
71
A type of encryption in which plain text is paired with secret keys and then encrypted
one-time pad
72
A real-time protocol that replaces CRLs to immediately verify a certificate's authenticity
Online Certificate Status Protocol (OCSP
73
Storing backup data at the same site as the servers on which the original data resides
onsite storage
74
A firewall technology that accepts or rejects packets based on their content
packet filtering
75
The process of looking through message packets to find data
packet sniffing
76
The computation of parity for a given set of data
parity information
77
The correct method of extinguishing a fire with an extinguisher: pull - aim - squeeze and sweep
PASS method
78
A nonactive response - such as logging
passive response
79
Attempting to ascertain a password that you should not know
password attacks
80
A fix for a known software problem
patch
81
Password-Based Key Derivation Function 2 applies some function (like a hash or HMAC) to the password or passphrase along with Salt to produce a derived key
PBKDF2
82
Security set up on the outside of the network or server to protect it
perimeter security
83
Card required of federal employees and contractors to gain access (physical and logical) to government resources
Personal Identity Verification (PIV)
84
Information that can be uniquely used to identify - contact - or locate a single person
personally identifiable information (PII)
85
A virus that modifies and alters other programs and databases
phage virus
86
A form of redirection in which traffic intended for one host is sent to another
pharming
87
A form of social engineering in which you simply ask someone for a piece of information that you are missing by making it look as if it is a legitimate request
phishing
88
A large Internet Control Message Protocol (ICMP) packet sent to overflow the remote host's bugger
ping of death
89
Standard telephone service - as opposed to other connection technologies like Digital Subscriber Line (DSL)
plain-old telephone service (POTS)
90
A cloud service model wherein the consumer can deploy but does not manage or control any of the underlying cloud infrastructure
Platform as a Service (PaaS)
91
When portable data storage devices (such as an iPod) are plugged directly into a machine and used to bypass the network security measures and illicitly download confidential information
pod slurping
92
A full-duplex line protocol that supersedes Serial Line Internet Protocol (SLIP) Its part of the standard TCP/IP suite and is often used in dial-up connections
Point-to-Point Protocol (PPP)
93
An extension to Point-to-Point Protocol (PPP) that is used in virtual private networks (VPNs) An Alternative to PPTP is L2TP
Point-to-Point Tunneling Protocol (PPTP)
94
Rules or standards governing usage
policies
95
An attribute of some viruses that allows them to mutate and appear differently each time they crop up
polymorphic
96
A means of translating between ports on a public and private network
Port Address Translation (PAT)
97
Scanning a server for open ports that can be taken advantage of by sending messages to ports to see which ones are available and which ones arent
port scanning
98
Connections available within TCP/IP
ports
99
An email access program that can be used to retrieve email from an email server
Post Office Protocol (POP)
100
The protocol used to download email from an SMTP email server to a network client
Post Office Protocol Version 3 (POP3)