vocabularyO2P Flashcards

1
Q

Object

A

A collection of data and a collection of methods or functions that operate on that data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Object

A

An entity that contains or controls data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

OFB

A

Output Feedback is a DES mode similar to CFB, but an XOR operation is performed with a randomly generated, encrypted 64-bit, plaintext value.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

One-way Function

A

A generic function that is used for producing output values; input values cannot be exposed from those output values.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Online Backup

A

A backup type that is performed while the Web is being accessed. The database management system manufacturer provides the utility for this type of backup.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

OOP

A

Object-oriented programming is a programming model that views a program as a collection of discrete objects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

OR

A

A binary math operator used in cryptography in which if neither of the input values are true or one, then the output is false, if either of the input values are one, then the output is true.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

OTP

A

A One-Time Pad is a type of substitution cipher in which a random value is written on a pad and securely given to the intended recipient. The value is then used to encrypt the original message which is then sent separately. The OTP is then used to decrypt the message and is never used again. An OTP is the only known unconditionally secure cipher.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

P

A

The 3DES plaintext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Packet Filtering Router

A

The oldest and most common firewall architecture in which a firewall is placed between the trusted and untrusted networks and uses ACLs to filter the packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Packet Sniffer

A

A troubleshooting tool used on a network to examine packets and to isolate problems that could degrade the performance of the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Parallel Test

A

The second step of a DRP test that enables full processing functionality at an alternate site.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Patent

A

A property right granted by the U.S. government that protects the inventors right to exclusive control of the creation and distribution of an invention. To warrant a patent, the invention must be new, useful, and nonobvious. A patent lasts for 20 years and is non-renewable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

PEM

A

Privacy Enhanced Mail is a cryptography protocol that is a secure e-mail standard which specifies how to encrypt and exchange e-mail between different clients.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Penetration Testing

A

A legal hacking process of pretending to be a hacker, scanning and probing the systems to see if it can be accessed. A coordinated set of attacks to judge the vulnerability of a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Phreaks

A

A cracker whose main goal is to compromise telephone company systems in order to obtain free long distance services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Physical Access Control

A

Physical implements such as hardware, a fence, or a locked door that stand between an attacker and the information system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Physical Access Controls

A

Controls which limit physical access to hardware.

19
Q

Physical Data Flow

A

The manner in which data messages actually travel down the OSI stack on a source machine, across the physical media, and up the OSI stack on the target machine.

20
Q

Physical Layer

A

The layer of the ISO/OSI reference model that is completely hardware-oriented. The physical layer takes packets that come in to the data-link layer and transmits a bit stream to a physical medium which is where the actual connection to the wire takes place.

21
Q

Physical Preventative Control

A

A control, such as a badge or access card, which stops something before it occurs.

22
Q

Physical Security

A

A device that protects an organizations assets from physical threats.

23
Q

Pipelining

A

The process which allows multiple actions to occur at a single time inside of the execution cycle.

24
Q

Plaintext

A

The original, readable message that the receiver will see in the end.

25
Q

Polyinstantiation

A

A process that allows multiple database objects to exist with the same key to avoid interference. This avoids disclosure of existence.

26
Q

Polymorphic Virus

A

A virus that modifies itself as it travels from system to system.

27
Q

POP

A

Point of presence is a specific point at which a user may connect using a local telephone to a wide area network.

28
Q

POP3

A

Post Office Protocol 3 is a component used to read and store messages.

29
Q

Port Scanning

A

An attack in which an automated query is performed on each port to see if it responds. If the port responds and is active, it generally will contain information about the software listening in on the port.

30
Q

POTS

A

Plain Old Telephone Service is a dial-up method using a modem to establish a connection between the users computer and the remote system. The connection speed is generally no more than 56 KB.

31
Q

PPP

A

Point-to-Point Protocol provides router-to-router and host-to-network connections in both synchronous and asynchronous circuits.

32
Q

PPTP

A

Point-to-Point Tunneling Protocol is an extension of PPP that was designed by Microsoft to enable secure data transfer between a remote client and a VPN server.

33
Q

Presentation Layer

A

The layer of the ISO/OSI reference model that provides data representation between systems, and provides the interface between the raw format of the data sent between machines and presentation of message types with an application response. The presentation layer provides text formatting, display, and code conversion.

34
Q

PRI

A

The Primary Rate Interface is an ISDN type that contains twenty-three 64-KB channels and one 16-KB channel.

35
Q

Primary Key

A

A candidate key that is used to uniquely identify a record and is used to reference a table, fetch data from a table, and enforce referential integrity.

36
Q

Primary Memory

A

Memory that is available to the CPU. Primary memory is commonly referred to as RAM or real memory.

37
Q

Privileged Mode

A

The operating mode with no protection from faulty or malicious code. The full instruction set is available.

38
Q

Process Isolation

A

A security control architecture where each process is confined to its own memory place. This ensures that no process can access memory outside of its own space constraint.

39
Q

PROM

A

Programmable read-only memory is read-only memory which is shipped from the chip manufacturer with nothing on it. The chip becomes ROM after it has been written to one time.

40
Q

Proprietary Protocol

A

A protocol that allows communication to take place only between similar machines.

41
Q

Protocol

A

A set of standards that all computers must agree upon when connected to a network. This makes it possible for each computer to talk with other computers on the network, with a minimal amount of communication breakdown.

42
Q

Prudent Man Rule

A

A rule or principle set forth by Judge Samuel Putnum to protect investors that use the services of investment advisors from poor or shady investments.

43
Q

Pseudo Flaw

A

An attack in which a fake vulnerability is introduced and used to entice attackers away from sensitive information.

44
Q

Purple Machine

A

A famous Japanese encryption machine that was broken by United States mathematicians during WW2.