500 Flashcards
(100 cards)
Filters that try to eliminate unwanted - unsolicited email sent in bulk
spam filters
A form of phishing in which the message is made to look as if it came from someone you know and trust as opposed to an informal third party
spear phishing
An attempt by someone or something to masquerade as someone/something else
spoofing
Software programs that work—often actively—on behalf of a third party
spyware
A replacement for FTP that allows secure copying of files from one host to another
SSH File Transfer Protocol (SFTP)
An access point’s broadcasting of the network name
SSID broadcast
Derived from policies - a standard deals with specific issues or aspects of a business
standard
Inspections that occur at all levels of the network and provide additional security using a state table that tracks every communication channel
stateful inspection
A virus that attempts to avoid detection by masking itself from applications
stealth virus
The science of hiding information within other information - such as a picture
steganography
A method of encryption that encrypts streams of data rather than blocks
stream cipher
A database language that allows queries to be configured in real time and passed to database servers
Structured Query Language (SQL)
Using subnet values to divide a network into smaller segments
subnetting
A method of encryption in which one letter or item is substituted for another
substitution cipher
An outline of those internal to the organization who have the ability to step into positions when they open
succession planning
A network device that can replace a router or hub in a local network and get data from a source to a destination
switches
The keys used when the same key encrypts and decrypts data
symmetrical keys
A snapshot of what exists
system image
An exercise that involves individuals sitting around a table with a facilitator discussing situations that could arise and how best to respond to them
tabletop exercise
Following someone through an entry point
tailgating
Controls that rely on technology
technical controls
A protocol that functions at the Application layer of the OSI model - providing terminal emulation capabilities
Telnet
A wrapper that works with wireless encryption to strengthen WEP implementations
Temporal Key Integrity Protocol (TKIP)
An authentication system that allows credentials to be accepted from multiple methods - including Kerberos
Terminal Access Controller Access-Control System (TACACS)