vocabularyT Flashcards

2
Q

TACACS

A

Terminal Access Controller Access Control System is a centralized authentication type that provides single factor authentication and authorization for direct access. The TACACS+ version implements two-factor authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Tailor Training

A

A method of training that matches the level of scope of the security training to the organizations security requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

TCB

A

Trusted Computing Base is a collection of hardware, software, and controls that work together to enforce the security policy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

TCP/IP

A

Transmission Control Protocol/Internet Protocol is a set of communication protocols developed by the U.S. Department of Defense that enables dissimilar computers to share information over a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

TCSEC

A

Trusted Computer System Evaluation Criteria is a book commonly referred to as the Orange Book, that was put together by the US Department of Defense in 1985 to specify categories that can be used to rate the functionality and assurance of a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Technical Control

A

Pieces of software or hardware that help to secure an organizations assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Terrorist Attack

A

A type of attack that attempts to alter the normal lifestyle of a group of people, generally in order to make a point. This type of attack generally targets infrastructure machines or other high-visibility entities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Threat

A

Any weakness that may include natural disasters, physical factors, or threats engineered by people.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Ticket

A

A multiple component message that is sent back and forth in Kerberos. The message contains the ticket and an authentication message specifying that the subject is authenticated or that a subject has been authenticated and is valid to access a specific object.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

TOC/TOU

A

Time of check/time of use is an attack that exploits timing vulnerabilities by modifying the object between the time of check, which verifies permissions and attributes, and the time of use, which is when the object is actually used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Token Device

A

A small device that generates passwords based on synchronous or asynchronous query to a centralized server. An example would be a smart card.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Token Ring

A

A network technology developed by IBM that has become the industry standard. The logical topology is always a ring and physical topology will generally be a star.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Top Secret

A

Information that is an elevated security label and ensures the information can only be viewed by the top information gathers or users. Must have top secret clearance and must need to know the information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Trade Secret

A

Any intellectual property critical to a business that is not divulged to outside parties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Trademark

A

A word, collection of words, slogan, or logo that identifies an organization or product. A registered trademark lasts for ten years and is renewable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Transparency

A

An operating system-level feature that allows users to access resources without knowing whether the resource is local or remote.

18
Q

Transport Layer

A

The layer of the ISO/OSI reference model that handles end-to-end transmission integrity, accurate delivery, and quality of service. This layer is also concerned with error detection and correction.

19
Q

Transport Mode

A

A mode of IPSec operation in which VPNs are used to connect two different systems. It sends a clear text header, but an encrypted payload.

20
Q

Transposition Cipher

A

A cipher that starts off with a key word on a table. The ordinal values are listed based on a letters position in the alphabet, the plaintext message is written in a tabular form, and the individual columns are then read.

21
Q

Trap Door

A

An attack using an entry point put into the code by the developer that bypasses all access controls.

22
Q

Tree Topology

A

A LAN topology comprised of two or more bus architectures in which at least one node is connected to both buses.

23
Q

Trojan Horse

A

A program that does damage to a system but does not copy or replicate itself.

24
Q

Tunnel Mode

A

A mode of IPSec in which everything is encrypted. It is commonly used to connect two different networks

25
Q

Tunneling

A

A transmission method based on protocols that is used over the Internet. A packet based on a protocol is encapsulated in a second packet based on whatever differing protocol is needed to allow it to travel over the network.

26
Q

Turnstile

A

A type of gate that regulates the direction and capacity of the opening. A turnstile is a type of physical access control.

27
Q

Twisted Pair

A

Regular copper wire with each pair twisted around the other. This improves the signal quality and increases the length of the span between different systems.