vocabularyC Flashcards

1
Q

CA

A

A certificate authority is a neutral third party that offers notarization services for digital certificates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cable Modem

A

A high-speed Internet access technology that uses the same physical medium as cable TV delivery.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Cache Memory

A

Small, high-speed area of memory on the CPU which briefly keeps accessed memory, but does not require multiple clock cycles.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Candidate Key

A

A collection of fields that can uniquely identify a record in a table.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

CBC

A

Cipher Block Chaining is a DES mode that takes each block and performs an XOR operation with it, and with the preceding block, before encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

CCTV

A

Closed Circuit Television is a security device that records the physical movement of users through the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Centralized Authentication

A

Authentication type where a single identity controls all access to certain objects. It is a strict control with a single point of failure that allows for easy administration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

CER

A

Crossover Error Rate is the value or system based upon the point at which the FRR and the FAR cross if it were graphed. The CER allows two different biometric methods to be compared.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

CFB

A

Cipher Feedback is a DES mode that takes the previous block of ciphertext, which is encrypted, and performs an XOR operation with the results and with current plaintext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Checklist Test

A

The simplest test in which a DRP team member follows each step from the DRP checklist and provides feedback on their findings. It functions both as a test and an awareness training exercise.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Chosen Ciphertext

A

An attack in which the attacker decrypts portions of the encrypted message, analyzing the decrypted fragments of the message to possibly discover the key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Chosen Plaintext

A

An attack in which the attacker encrypts the plaintext message, making it ciphertext, then compares it to another encrypted message to find similarities or matches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

CIA

A

The security triad consisting of three tenants, Confidentiality, Integrity, and Availability, combined together to make a secure system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Cipher

A

The process of altering or rearranging plaintext so that it is unreadable and generating ciphertext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Ciphertext

A

The message after it has been encrypted; it is only readable after it has been decrypted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

CIS

A

CompuServe Information Service is one of the largest online services to provide e-mail services and connection to many different database systems.

17
Q

CISC

A

Complex instruction set computing is an instruction set design where each instruction performs multiple steps. The compilers may be simple, but performance can suffer.

18
Q

CISSP

A

Certified Information Systems Security Professional is a vendor-neutral certification that covers ten different domains. Develops interest and proficiency in many different areas of security.

19
Q

Civil Law

A

A body of laws that are intended to settle disputes between individuals and organizations.

20
Q

Clark-Wilson Model

A

A security model designed in 1987 for commercial applications. It enforces integrity.

21
Q

Client

A

A computer that requests information from servers.

22
Q

Clock

A

A simple circuit that emits pulses at a standard frequency.

23
Q

Cold Site

A

A data center alternative facility with basic utilities that may be used after a disaster. It is the least expensive option, but requires the most work and about 24 hours to restore operations.

24
Q

Column

A

A group of fields positioned vertically on a datasheet.

25
Q

Companion Virus

A

A file infector that uses the same file name as the file being attacked, but with a different extension that has a higher priority.

26
Q

Computer Fraud and Abuse Act

A

The original law set forth by the U.S. government to address computer crime that crosses state lines. This law constitutes a crime as any unauthorized access to classified or financial information on a federal system, unauthorized access to a federal system, the use of a federal system to commit fraud, and other similar acts.

27
Q

Computer Security Act

A

The law set forth by the U.S. government that assigns responsibility for developing standards and guidelines, provides for the promulgation of those standards, requires security plans for federal systems containing sensitive data, and requires mandatory periodic training for users of machines containing sensitive data.

28
Q

Confidential

A

Information that requires the individual to access specific information, but requires a clearance first.

29
Q

Confidentiality

A

Part of the security triad that protects data from unauthorized disclosure by means such as physical security or access control.

30
Q

Control

A

A safeguard that lessens risk once a high probability of a loss has been realized.

31
Q

Copyright Law

A

A law that protects the exclusive right of a creator to control publication and distribution of original works of authorship.

32
Q

Covert Channels

A

A method for passing information that is not normally used for communication.

33
Q

CPU

A

The central processing unit is the computing part of the computer, made up of the control unit and the arithmetic logic unit. It is also referred to as the processor.

34
Q

Cracker

A

A person who attempts to compromise a system for an unauthorized purpose.

35
Q

Criminal Law

A

A body of laws that preserve the peace and keep society safe. Criminal cases are prosecuted by the state.

36
Q

Critical Path Analysis

A

An analysis that defines relationships between mission critical applications. This type of analysis is performed to show what must happen to stay in business.

37
Q

CSMA/CD

A

Carrier Sense Multiple Access with Collision Detection is a protocol used to handle situations in which more than one node is transmitting at the same time, causing a collision.

38
Q

CU

A

The control unit is outside of the CPU. It accesses and interrupts the actual instructions and directs what happens from those instructions.