400 Flashcards

1
Q

Anything that occurs after the fact - such as an audit or review

A

postmortem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Controls intended to prevent attacks or intrusions

A

preventive controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A state of security in which information isn’t seen by unauthorized parties without the express permission of the party involved

A

privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Screens that restrict viewing of monitors to only those sitting in front of them

A

privacy filters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A cloud delivery model owned and managed internally

A

private cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An asymmetric encryption technology in which both the sender and the receiver have different keys

A

private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The result when a user obtains access to a resource they wouldn’t

A

privilege escalation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The likelihood of something occurring

A

probability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A mode wherein a network interface card (NIC) intercepts all traffic crossing the network wire and not just the traffic intended for it

A

promiscuous mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A network in which physical network security has been substituted for encryption security

A

protected distribution system (PDS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

An authentication protocol that replaces LEAP and for which there is native support in Windows

A

Protected Extensible Authentication Protocol (PEAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A software and hardware troubleshooting tool that is used to decode protocol information to try to determine the source of a network problem and to establish baselines

A

protocol analyzer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Cards that can be read by being near a reader

A

proximity cards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Readers capable of working with proximity cards

A

proximity readers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A type of system that prevents direct communication between a client and a host by acting as an intermediarty

A

proxy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A proxy server that also acts as a firewall - blocking network access from external networks

A

proxy firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A type of server that makes a single Internet connection and services requests on behalf of many users

A

proxy server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Cameras that can pan - tilt - and zoom

A

PTZ

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A cloud delivery model available to others

A

public cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A technology that facilitates encryption using two keys—a public key and a private key- to facilitate communication

A

public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A set of voluntary standards created by RSA security and industry leaders

A

Public-Key Cryptography Standards (PKCS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A two-key encryption system wherein messages are encrypted with a private key and decrypted with a public key

A

public-key infrastructure (PKI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

The Internet Engineering Task Force (IETF) working group developing standards and models for the Public Key Infrastructure (PKI) environment

A

Public-Key Infrastructure X.509 (PKIX)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A collection of technologies that provide the ability to balance network traffic and prioritize workloads

A

QoS (quality of service)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Used in risk management - it involves measuring the quality of something (as opposed to the quantity)
qualitative
26
Numerically measuring the quantity of something (as opposed to the quality)
quantitative
27
Cryptography based on changing the polarity of a photon
quantum cryptography
28
The byproduct of electrical processes - similar to electromagnetic interference
radio frequency interference (RFI
29
A table of hashed phrases/words that can be used in a password attack
rainbow table
30
Software that demands payment before restoring the data or system infected
ransomware
31
Within business continuity planning - this is the point of maximum tolerable loss for a system due to a major incident
recovery point objective (RPO)
32
The maximum amount of time that a process or service is allowed to be down and the consequences still to be considered acceptable
recovery time objective (RTO)
33
A configuration of multiple hard disks used to provide fault tolerance should a disk fail
Redundant Array of Independent Disks (RAID)
34
An organization that offloads some of the work from a certificate authority (CA)
registration authority (RA)
35
A database technology that allows data to be viewed in dynamic way based on the users or administrators needs
relational database
36
A computer that has one or more connections installed to enable remote connections to the network
Remote Access Services (RAS)
37
A networking protocol that allows authentication of dial-in and other network connections
Remote Authentication Dial-In User Service (RADIUS)
38
A protocol used to allow remote desktop connections
Remote Desktop Protocol (RDP
39
A programming interface that allows a remote computer to run programs on a local machine
Remote Procedure Call (RPC)
40
The process of sending a command to remotely clear data
remote wipe
41
An attack that captures portions of a session to play back later to convince a host that it is still talking to the original connection
replay attack
42
A database or database server where the certificates are stored
repository
43
A document-creation process and a set of practices that originated in 1969 and is used for proposed changes to internet standards
Request for Comments (RFC)
44
Information that isn't made available to all and to which access is granted based on some criteria
restricted information
45
A virus that attacks or bypasses the antivirus software installed on a computer
retrovirus
46
A strategy of dealing with risk in which it is decided the best approach is simply to accept that the risk exists
risk acceptance
47
An evaluation of each risk that can be identified
risk analysis
48
An evaluation of how much risk you and your organization are willing to take
risk assessment
49
A strategy of dealing with risk in which it is decided that the best approach is to avoid the risk
risk avoidance
50
The process of calculating the risks that exist
risk calculation
51
A strategy of dealing with risk in which it is decided that the best approach is to discourage potential attackers from engaging in the behavior that leads to the risk
risk deterrence
52
A strategy of dealing with risk in which it is decided that the best approach is too lessen the risk
risk mitigation
53
A strategy of dealing with risk in which it is decided that the best approach is to offload some of the risk
risk transference
54
An unauthorized wireless access point on a network
rogue access points
55
A form of malware that tries to convince the user to pay for a fake threat
rogueware
56
A type of control wherein the levels of security closely follow the structure of an organization
Role-Based Access Control (RBAC)
57
Software program that has the ability to obtain root-level access and hide certain things from the operating system
rootkit
58
A device that connects two or more networks and allows packets to be transmitted and received between them
router
59
The current Microsoft server service for Windows-based clients that offers the ability to connect to remote systems
Routing and Remote Access Services (RRAS)
60
One of the providers of cryptography systems to industry and government
RSA
61
Access control method that uses the settings in preconfigured security policies to make all decisions
Rule-Based Access Control (RBAC)
62
A separate network set up to appear as a server to the main organizational network
SAN (storage area network)
63
Isolating applications to keep users of them from venturing to other data
sandboxing
64
Software that tries to convince unsuspecting users that a threat exists
scareware
65
The section of a guideline that provides an overview and statement of the guidelines intent
scope and purpose
66
The portion of the policy outlining what it intends to accomplish and which documents - laws - and practices the policy addresses
scope statement
67
A replacement for FTP that allows secure copying of files from one host to another
Secure Copy (SCP)
68
A protocol developed by Visa and MasterCard for secure credit card transactions
Secure Electronic Transaction (SET)
69
A one-way hash algorithm designed to ensure the integrity of a message
Secure Hash Algorithm (SHA)
70
A protocol used for secure communications between a web server and a web browser
Secure Hypertext Transport Protocol (S-HTTP)
71
A protocol used for secure communications between email servers
Secure Multipurpose Internet Mail Extensions (S/MIME)
72
A replacement for rlogin in Unix/Linux that includes security
Secure Shell (SSH)
73
A protocol that secures messages by operating between the Application layer(HTTP) and the Transport layer
Secure Sockets Layer (SSL)
74
Looking for weaknesses through interviews - examinations - and testing of systems
security control testing (SCT)
75
Policies related to security
security policies
76
A piece of data that contains the rights and access privileges of the token bearer as part of the token
security token
77
A method of isolating a system from other systems or networks
security zone
78
The IDS component that collects data from the data source and passes it to the analyzer for analysis
sensor
79
Operating system updates from Microsoft
service pack
80
An agreement that specifies performance requirements for a vendor
service-level agreement (SLA)
81
Protective coating around wiring often intended to protect it from interference
shielding
82
Watching someone when they enter their username - password - or sensitive data
shoulder surfing
83
The process of ignoring an attack
shunning
84
A system that acts based on the digital signature it sees
signature-based system
85
A protocol for sending email between SMTP servers
Simple Mail Transfer Protocol (SMTP)
86
The management protocol created for sending information about the health of the network-to-network management consoles
Simple Network Management Protocol (SNMP)
87
The cost of a single loss when it occurs
single loss expectancy (SLE)
88
A weakness that brings a system down
single point of failure (SPOF)
89
A relationship between the client and the network wherein the client is allowed to log on one time - and all resource access is based on that logon (as opposed to needing to log on to each individual server to access the resources there)
single sign-on (SSO)
90
Authentication based on a single factor (a password - for example)
single-factor authentication (SFA)
91
A database model in which the database and the application exist on a single system
single-tier environment
92
A generic site survey involves listening in on an existing wireless network using commercially available technologies
site survey
93
A physical card used for access control and security purposes
smart card
94
An attack in which large volumes of ICMP echo requests (pings) are broadcast to all other machines on the network and in which the source address of the broadcast system has been spoofed to appear as though it came from the target computer
smurf attack
95
Image of a virtual machine at a moment in time
snapshot
96
A physical device that listens in (sniffs) on network traffic and looks for items it can make sense of
sniffer
97
Analyzing data to look for passwords and anything else of value
sniffing
98
An attack that uses others by deceiving them
social engineering
99
A model of cloud computing in which the consumer can use the provider's applications but they do not manage or control any of the underlying cloud infrastructure
Software as a Service (SaaS)
100
Unwanted - unsolicited email sent in bulk
spam