500 Flashcards Preview

Security > 500 > Flashcards

Flashcards in 500 Deck (100)
Loading flashcards...
1

Filters that try to eliminate unwanted - unsolicited email sent in bulk

spam filters

2

A form of phishing in which the message is made to look as if it came from someone you know and trust as opposed to an informal third party

spear phishing

3

An attempt by someone or something to masquerade as someone/something else

spoofing

4

Software programs that work—often actively—on behalf of a third party

spyware

5

A replacement for FTP that allows secure copying of files from one host to another

SSH File Transfer Protocol (SFTP)

6

An access point's broadcasting of the network name

SSID broadcast

7

Derived from policies - a standard deals with specific issues or aspects of a business

standard

8

Inspections that occur at all levels of the network and provide additional security using a state table that tracks every communication channel

stateful inspection

9

A virus that attempts to avoid detection by masking itself from applications

stealth virus

10

The science of hiding information within other information - such as a picture

steganography

11

A method of encryption that encrypts streams of data rather than blocks

stream cipher

12

A database language that allows queries to be configured in real time and passed to database servers

Structured Query Language (SQL)

13

Using subnet values to divide a network into smaller segments

subnetting

14

A method of encryption in which one letter or item is substituted for another

substitution cipher

15

An outline of those internal to the organization who have the ability to step into positions when they open

succession planning

16

A network device that can replace a router or hub in a local network and get data from a source to a destination

switches

17

The keys used when the same key encrypts and decrypts data

symmetrical keys

18

A snapshot of what exists

system image

19

An exercise that involves individuals sitting around a table with a facilitator discussing situations that could arise and how best to respond to them

tabletop exercise

20

Following someone through an entry point

tailgating

21

Controls that rely on technology

technical controls

22

A protocol that functions at the Application layer of the OSI model - providing terminal emulation capabilities

Telnet

23

A wrapper that works with wireless encryption to strengthen WEP implementations

Temporal Key Integrity Protocol (TKIP)

24

An authentication system that allows credentials to be accepted from multiple methods - including Kerberos

Terminal Access Controller Access-Control System (TACACS)

25

Any perceivable risk's area of attack

threat vector

26

A database model that effectively isolates the end user from the database by introducing a middle server

three-tier model

27

A form of trust relationship often used between domains

transitive access

28

Trust gained because one party (A) trusts another party (B) - which then trusts another party ( C ) Since (B) trusts ( C ) then a relationship can exist where the first party (A) also may trust the third (c )

transitive trusts

29

The protocol found at the Host-to-Host layer of the Department of Defense (DoD) model

Transmission Control Protocol (TCP)

30

A protocol whose purpose is to verify that secure communications between a server and a client remain secure

Transport Layer Security (TLS)