vocabularyE2F Flashcards

1
Q

E

A

The 3DES encryption algorithm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Eavesdropping

A

A type of attack involving the reading of messages that are not intended for the subject.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Eavesdropping

A

An attack similar to sniffing, but includes recording or listening to conversations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ECB

A

Electronic Codebook is a DES mode that takes each 64-bit block and encrypts it with a key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

ECPA

A

The Electronic Communications Privacy Act of 1986 was the first entry into privacy issues concerning electronic communication. The law made it a crime to invade a persons electronic privacy such as e-mail, voice mail, and cell phone monitoring.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

El Gamal

A

An asymmetrical cryptographic algorithm that uses large integers and modular arithmetic to calculate keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Encapsulation

A

A feature gained through object-oriented programming that allows data to be hidden and stored as a unit in an object. The data may only be accessed through predefined methods.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Encryption

A

The process of rendering data incomprehensible to unauthorized users by applying an algorithm to alter the datas appearance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Enigma Machine

A

A machine developed by the Germans during World War II. The machine was made up of rotors that rotated depending on the key set, therefore encrypting a message. This machine was never broken, only duplicated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

EPROM

A

Erasable programmable read-only memory is where the BIOS is burned into the chip. It is memory that can be erased using UV light through a small window embedded into the top of the chip.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Espionage

A

An act where the goal is to steal something of value from someone else. Espionage can sometimes be copying something that is very valuable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Ethernet

A

A common LAN architecture using a bus or star topology and the CSMA/CD access method to manage simultaneous communication demands. Ethernet is the basis for the IEEE 802.3 standard.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Evidence

A

Any hardware, software, or data that can be used to verify the origin and details of an incident.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Execution Cycle

A

A three-step cycle that includes fetching instructions from memory, decoding the instructions, and executing the instructions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Expert System

A

A knowledge-based system that stores a large volume of data in one area of specialty, simulating the knowledge and decisions of an expert human.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

FAR

A

False Acceptance Rate is the rate at which a biometrics system accepts an invalid subject.

17
Q

Fault Tolerance

A

A computer system or component designed so that in the case of a failure of either hardware or software, another backup system immediately takes its place with no loss of service.

18
Q

FDDI

A

Fiber Distributed Data Interface is a standard used by LANs wired with fiber-optic cable for data transmission.

19
Q

Fence

A

A physical access control that defines a perimeter barrier, marking the inside from the outside.

20
Q

Field

A

A section of a database record that contains a single piece of information.

21
Q

File Infector

A

A virus that modifies or replaces an executable file. A file infector activates when the infected file is run.

22
Q

Financial Attack

A

A type of attack that attempts to improperly acquire goods, services, or money in order to benefit the attacker.

23
Q

Firewall

A

A method used to protect a network system against intrusions from unauthorized users or systems. A firewall will block unsecured connections based on protocol or untrustworthy relationships.

24
Q

Firewall

A

A method used to protect a network system from intrusions from unauthorized users or systems. A firewall will block unsecured connections based on protocol or untrustworthy relationships.

25
Q

Firmware

A

Software that is stored on a ROM chip.

26
Q

Flooding

A

A type of DoS attack that sends a large number of packets to a victims machine without responding to the victims acknowledgements, making the victim maintain the maximum number of open connections and allowing no new connections to be made.

27
Q

Frame Relay

A

A switched data-link layer protocol that uses a form of HDLC encapsulation to handle multiple virtual circuits.

28
Q

FRR

A

False Rejection Rate is the rate at which a biometrics system would reject a valid subject.

29
Q

Full-interruption Test

A

The only real test that is not a simulation. The primary data centers power is cut and the data is then recovered at the alternative site. The test must be preauthorized as it can cause a substantial business process interruption.

30
Q

Full Backup

A

A backup type which dumps all important data files out to a different device such as tape, disk, archive file, or system-to-system over the network.

31
Q

Fun Attack

A

A type of attack that is executed for the thrill and prestige of the attacker.