700 Flashcards

(100 cards)

1
Q

A notification that an unusual condition exists and should be investigated.

A

alert

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The series of steps/formula/process that is followed to arrive at a result.

A

algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The component or process that analyzes the data collected by the sensor.

A

analyzer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A calculation that is used to identify risks and calculate the expected loss each year.

A

annual loss expectancy (ALE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A calculation of how often a threat will occur.

A

annualized rate of occurrence (ARO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The act of looking for variations from normal operations (anomalies) and reacting to them.

A

anomaly detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Authentication that doesn’t require a user to provide a username - password - or any other identification before accessing resources.

A

anonymous authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A category of software that uses various methods to prevent and eliminate viruses in a computer.

A

antivirus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The core program that runs the virus-scanning process.

A

antivirus engine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Software that identifies the presence of a virus and is capable of removing or quarantining the virus.

A

antivirus software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A networking capability included with all Macintosh Computers.

A

AppleTalk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A freestanding device that operates in a largely self-contained manner.

A

appliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The seventh layer of the OSI model. This layer deals with how applications access the network and describes application functionality - such as file transfer - messaging - and so on.

A

Application layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

An abstract interface to the services and protocols provided by an operating system.

A

Application Programming Interface (API)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A virus that is protected in a way that makes disassembling it difficult.

A

armored virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Any resource of value.

A

asset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Any unauthorized intrusion into the normal operations of a computer or computer network.

A

attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Files that hold information about a resource’s access by users.

A

audit files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The act of tracking resource usage by users.

A

auditing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Individuals involved in auditing log and security files.

A

auditors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Verifying that the logs and other resources collected are legitimate.

A

authenticating the evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

The means of verifying that someone is who they say they are.

A

authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

The time period during which a resource can be accessed.

A

availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

An opening left in a program application (usually by the developer) that allows additional access to data.

A

backdoor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Originally created as a support tool - it is now well known as an illicit server program that can be used to gain access to Windows NT/2000 servers and take control.
Back Orifice
26
A copy of data made to removable media.
backup
27
A documented plan governing backup situations.
backup plan
28
A written policy detailing the frequency of backups and the location of storage media.
backup policy
29
A model designed for the military to address the storage and protection of classified information. The model prevents the user from accessing information that has a higher security rating than they are authorized to access. It also prevents information from being written to a lower level of security.
Bell La-Padula model
30
A set of rules governing basic operations.
best practices
31
A device that can authenticate an individual based on a physical characteristic.
biometric device
32
The science of identifying a person by using one or more of their features. This can be a thumbprint - a retina scan - or any other biological trait.
biometrics
33
A probability method of finding similar keys in MD5.
birthday attack
34
A type of symmetric block cipher created by Bruce Schneier.
Blowfish
35
Also known as the Master Boot Record (MBR). The first sector of the hard disk - where the program that boots the operating system resides. It's a popular target for viruses.
boot sector
36
A protocol predominantly used by ISPs that allows routers to share information about routes with each other.
Border Gateway Protocol (BGP)
37
A router used to translate from LAN framing to WAN framing.
border router
38
A type of attack that relies purely on trial and error.
brute force attack
39
A type of DoS attack that occurs when more data is put into a buffer than it can hold - thereby overflowing it (as the name implies.)
buffer overflow attack
40
A contingency plan that will allow a business to keep running in the event of a disruption to vital resources.
Business Continuity Planning (BCP)
41
A study of the possible impact if a disruption to a business's vital resources were to occur.
Business Impact Analysis (BIA)
42
A type of symmetric block cipher defines by RFC 2144.
Carlisle Adams Stafford Tavares (CAST)
43
The primary office from which most resources extend.
central office
44
A digital entity that establishes who you are and is often used with e-commerce
certificate
45
An issuer of digital certificates (which are then used for digital signatures or key pairs.)
certificate authority (CA)
46
Policies governing the use of certificates
certificate policies
47
The principles and procedures employed in the issuing and managing of certifications.
Certificate Practice Statement (CPS)
48
The act of making a certificate invalid.
certificate revocation
49
A list of digital certificate revocations that must be regularly downloaded to stay current.
Certificate Revocation List (CRL)
50
The log of the history of evidence that has been collected.
chain of custody
51
A protocol that challenges a system to verify identity.
Challenge Handshake Authentication Protocol (CHAP)
52
Documentation required to make a change in the scope of any particular item.
change documentation
53
A certain action or moment in time that is used to perform a check. It allows a restart to begin at the last point the data was saved as opposed to from the beginning.
checkpoint
54
A hexadecimal value computed from transmitted data that is used in error-checking routines.
checksum
55
A switching method where a dedicated connection between the sender and receiver is maintained throughout the conversation.
circuit switching
56
An integrity model for creating a secure architecture.
Clark-Wilson model
57
Unencrypted text that can be read with any editor.
cleartext
58
The part of a client/server network where the computing is usually done. In a typical setting - a client uses the server for remote storage - backups - or security (such as a firewall).
client
59
A server-centric network in which all resources are stored on a file server and processing power is distributed among workstations and the file server.
client/server network
60
An early encryption system offered by the NSA for civilian use that was a hardware implementation of the skipjack encryption algorithm.
clipper chip
61
A method of balancing loads and providing fault tolerance.
clustering
62
A type of cabling used in computer networks
coax
63
The storage and conditions for release of source code provided by a vendor - partner - or other party.
code escrow
64
A physical site that has all the resources necessary to enable an organization to use it if the main site is inaccessible (destroyed).
cold site
65
The means and orderly fashion by which evidence is collected - identified - and marked.
collection of evidence
66
An agreement between individuals to commit fraud or deceit.
collusion
67
A document of specifications detailing security evaluation methods for IT products and systems.
Common Criteria (CC)
68
A set of standards - formerly known as the Mutual Recognition Agreement (MRA) - the define Evaluation Assurance Levels (EALs).
Common Criteria Recognition Agreement (CCRA)
69
An older form of scripting that was used extensively in early web systems.
Common Gateway Interface (CGI)
70
A virus that creates a new program that runs in place of an expected program of the same name.
companion virus
71
Standards that support a non-hierarchical security classification.
compartmentalization
72
The act of assuring that data remains private and no one sees it except for those expected to see it.
confidentiality
73
The administration of setup and changes to configuration.
configuration management
74
Communications between two hosts that have no previous session established for synchronizing sent data.
connectionless
75
Communications between two hosts that have a previous session established for synchronizing sent data.
connection-oriented
76
A plain-text file stored on your machine that contains information about you (and your preferences) for use by a database server.
cookie
77
Functions on which the livelihood of the company depends.
critical business functions
78
The study and practice of finding weaknesses in ciphers.
cryptanalysis
79
A person who does cryptanalysis.
cryptanalyst
80
A person who participates in the study of cryptographic algorithms.
cryptographer
81
A symmetric algorithm - also known as a cipher - used to encrypt and decrypt data.
cryptographic algorithm
82
The field of mathematics focused on encrypting and decrypting data.
cryptography
83
An individual responsible for maintaining the data - and the integrity of it - within their area.
custodian
84
An error-checking method in data communications that runs a formula against data before transmission.
cyclical redundancy check (CRC)
85
A level of confidence that data won't be jeopardized and will be kept secure.
data integrity
86
The second layer of the OSI model. It describes the physical topology of a network.
Data Link layer
87
A unit of data sent over a network. A packet includes a header - addressing information - and the data itself.
data packet
88
A centralized storage location for data - such as a database.
data repository
89
Where data originates.
data source
90
A Layer 3 packet descriptor.
datagram
91
The process of converting encrypted data back into its original form.
decryption
92
The router to which all packets are sent when the workstation doesn't know where the destination station is or when it can't find the destination station on the local segment.
default gateway
93
A method of placing web and other servers that serve the general public outside the firewall and - therefore - isolating them from internal network access.
demilitarized zone (DMZ)
94
A type of attack that prevents any users--even legitimate ones--from using the system.
Denial of Service (DoS) attack
95
A portion of a complete address of the PC to which data is being sent from a sending PC. The port portion allows for the demultiplexing of data to be sent to a specific application.
destination port number
96
The act of noticing an irregularity as it occurs.
detection
97
An attack that uses words from a database (dictionary) to test against passwords until a match is found.
dictionary attack
98
A type of backup that includes only new files or files that have changed since the last full backup.
differential backup
99
This cryptographic algorithm is used primarily to send secret keys across public networks. The process isn't used to encrypt or decrypt messages; it's used merely for the transmission of keys in a secure manner.
Diffie-Hellman
100
An electronic signature whose sole purpose is to authenticate the sender.
digital signature