Card #1 - 50 Flashcards

(50 cards)

1
Q

Grayware

A

not classified as viruses but can harm the performance of computers on your network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cisco PIX

A

helps network security administrators and IT managers for bandwidth monitoring, and Firewall internet security events monitoring efficiently

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Spamtrap

A

a DNS technique used by botnets to hide phising and malware delivery sites behind an ever-changing network of compromised hots acting as proxies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Non-repudiation

A

provides definitive proof of a sender’s identity and can be used to prevent a party from denying that they took a specific action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Authentication

A

proving the person is who they say they are

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Data Recovery

A

salvaging data from damaged, failed, corrupted, or inaccessible secondary storage media the not CANNOT be accessed normally

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Timing

A

process of verifying a user’s identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Networking

A

science of writing in secret code and is an ancient art

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Secret Key Cryptography (SKC)

A

use for privacy and confidentiality. One key for encryption and another for decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Botnets

A

number of hijacked Internet-connected devices, each of which runs one or more bots, remotely controlled by hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

3 Factors of Authentication

A
  1. Something you know (username/password)
  2. Something you have (smart cards)
  3. Something you are (fingerprint, biometrics)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Data Warehouse

A

a duplicate of some or all of the main database’s data stored on a separate computer from the main database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Cold Site

A

least expensive type of backup site for an organization to operate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Risk mitigation controls to ensure employee safety

A

Emergency lighting, drills, escape plans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A denial service attack has occurred. Which questions should be answered during the incident identification phase?

A

What servers have been compromised?

AND

What is the impact to the business?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Public Key Cryptography

A

a pair of keys to encrypt and decrypt data to protect it against unauthorized access or use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Surge

A

a prolong increase in the voltage level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

sandbox

A

a security mechanism for separating running programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Authorization

A

a security system validates whether or not a user has permission to complete an action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Exception Handling

A

implements into application to respond more appropriately to errors and generate an error message when they occur.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Algorithm

A

a set of instructions normally implemented on a computer system as a procedure to manipulate data

22
Q

Spim

A

spam sent over instant message

23
Q

AAA

A

Authentication, Authorization, and Accounting

24
Q

Access control

A

a security measure that defines who can access a computer, device, or network, when they can access it, and what actions they can take while accessing it

25
Access Creep
slow accumulation of unnecessary permissions, access rights, and outright privileges by individual users
26
Internal Employee
What causes most information security breaches
27
Active Response IDS
Automatically taking action in response to a detected intrusion
28
ActiveX
A Microsoft technology that allows reusable software components to interact with each other in networks. Popular with viruses, Trojan Horses, spyware, and other malicious code due to lack of security.
29
ActiveX controls
used to add Windows functionality and interactivity to web pages.
30
Address Resolution Protocol (ARP)
A protocol form the TCP/IP suite that is used to discover the MAC address of a destination IP address
31
Adware
Any software application that displays advertisement banners while the program's running Software that automatically displays or downloads advertising material (often unwanted) when a user is online
32
Alert
notification that a specific attack has been directed at the information system of an organization
33
Full Disk Encryption
Type of data encryption most often uses keys generated from the TPM
34
Public Key Infrastructure (PKI)
combination of software, encryption technologies, and services that enables entities to protect the security of their communications and business transactions on networks
35
TOTP (Time-based One-time Password Algorithm)
provides one-time password in an application that needs a two-factor authentication
36
Fingerprint
unique to all individuals
37
Integrity
implemented to verity that data has not been modified, tampered, or corrupted
38
What does the recipient need to decrypt the message?
the recipient's private key
39
Anonymous access
user will be able to login without providing a password, or by using any email address as the password
40
Antivirus software
a class of programs that searches your hard drive and floppy disks for any known or potential viruses
41
Application and device control
protects the system's resources form applications and manages the peripheral devices that can attach to computers
42
Application backdoor
hidden access that provides some level of control of the program
43
Application layer firewalls
Inspects traffic all the way up to layer 7 of the OSI model.
44
Armored Viruses
designed to be difficult to detect and remove
45
ARP spoofing
forging a MAC address in ARP messages
46
Asset identification
first step towards a secure organization. identifying what you need to protect
47
Asymmetric Key
algorithms are used to create a mathematically related key pair (a secret private key and a published public key
48
Attack
intentional act of attempting to bypass one or more computer security controls
49
Attributable data should be :
always traced to individuals responsible for observing and recovering the data
50
Audit Trail
a record showing who has accessed a computer system and what operations he or she has performed during a given period of time (for maintaining security and for recovering lost transactions)