500 Flashcards Preview

Security > 500 > Flashcards

Flashcards in 500 Deck (100)
Loading flashcards...
31

An encryption method that involves transposing or scrambling the letters in a certain manner

transposition cipher

32

A symmetric block cipher algorithm used for encryption

Triple-DES (3DES)

33

A UDP-based protocol similar to FTP that doesn't provide the security or error-checking features of FTP

Trivial File Transfer Protocol (TFTP)

34

Any application that masquerades as one thing in order to get past scrutiny and then does something malicious

Trojan horse

35

Any operating system that meets the government's requirement for security

trusted operating system (TOS)

36

A method of using encryption and storing the passwords on a chip

Trusted Platform Module (TPM)

37

The act of sending data across a public network by encapsulating it into other packets

tunneling

38

Using two access methods as a part of the authentication process

two-factor authentication

39

A database model in which the client workstation or system runs an application that communicates with the database that is running on a different server

two-tier model

40

Virtualization method that is independent of the operating system and boots before the OS

Type I hypervisor

41

Virtualization method that is dependent on the operating system

Type II hypervisor

42

Creating domains that are based on the misspelling of another

typo squatting

43

A device that can provide short-term power - usually by using batteries

uninterruptible power supply (UPS)

44

Registering domains that are similar to those for a known entity but based on a misspelling or typographical error

URL hijacking

45

The protocol at the Host-to-Host layer of the TCP/IP Department of Defense (DoD)model - which corresponds to the Transport layer of the OSI model

User Datagram Protocol (UDP)

46

Eavesdropping on CRT and LCD displays by detecting their electromagnetic emissions

Van Eck phreaking

47

A multialphabet substitution cipher

Vigenère cipher

48

A local area network (LAN) that allows users on different switch ports to participate in their own network - separate from but still connected to the other stations on the same or a connected switch

virtual local area network (VLAN)

49

A system that uses the public Internet as a backbone for a private interconnection (network) between locations

virtual private network (VPN)

50

Emulating one or more physical computers on the same host

virtualization

51

A program intended to damage a computer system

virus

52

Combining phishing with Voice over IP (VoIP)

vishing

53

The amount of time that you have to collect certain data before a window of opportunity is gone

volatility

54

Identifying specific vulnerabilities in your network

vulnerability scanning

55

Markings left - often written in chalk - by those who discover a vulnerability that provides a way into the wireless network

war chalking

56

Driving around with a laptop looking for open wireless access points with which to communicate

war driving

57

A site that provides some capabilities in the event of a disaster

warm site

58

Identifying a site that is visited by those that they are targeting -

watering hole attack

59

A firewall that can look at every request between a web client and a web server and identify possible attacks

web application firewall (WAF)

60

Another term for social engineering

wetware