Cards #101 - 150 Flashcards

(50 cards)

1
Q

Cryptographic keys

A

used in encrypting and decrypting information, there are private keys and public keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cryptography

A

science of writing on a secret code and is an ancient art

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Cyber bullying

A

any online behavior that embarrasses or hurts feelings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

DAC (Discretionary Access Control)

A

a person has complete control over the object that it owns and the programs that it executes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Data driven attack

A

a form of attack that is encoded in seemingly innocuous data which is executed by a user or a process to implement an attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Data integrity

A

when automated data is the same as in the source documents (has not been exposed to alternation or destruction)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Digital signature

A

a way to verify that an email message is really from the person who supposedly sent it and that it hasn’t been changed (has a public key and a private key)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Deceiving

A

giving a false impression, lying

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Defense against IP spoofing

A

monitoring network for atypical activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Spoofing

A

type of cyber attack that is used by hackers to gain access to computers and mine them for sensitive data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Demilitarized some (DMZ)

A

hosts of DMZ are typically web servers, email servers, and the alike, and are accessible for both internal and external users (allow user on the Internet to access the servers without accessing the organization’s internal network)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Denial of Service (DoS)

A

prevents legitimate users from using a service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

DES-CBC

A

default cipher for the IPSec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Dial-Up

A

service whereby a computer terminal can use the telephone to initiate and effect communication with a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Dictionary attack

A

attack that uses brute-force technique of successively trying all the words in some large, exhaustive list

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Differential backup

A

backups any files that have been altered since the last full backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Direct action virus

A

a virus that takes instant action in your device usually spread by executable files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Directory Harvest Attack

A

an attempt to determine the valid e-mail addresses associated with an e-mail server so that they can be added to a spam database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Disasters can be categorized into tow broad categories :

A

Man-made and Electronic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Discretionary Access Control (DAC)

A

a means of restricting access to objects based on the identity of subjects and/or groups to which they belong

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Floppy Disks

A

highly vulnerable to damage by magnetic fields and the environment. unsuitable for storing and archiving data compared to today’s alternative removable media

22
Q

Distributed Denial of Service (DDoS)

A

when an attacker attacks from multiple source systems. Distributes trojan horses to PCs, zombies or slaves, an uses them to launch the attack

23
Q

Distributed Tool

A

tool that can be distributed to multiple hosts, which can then be coordinated to anonymously perform an attack on the target host simultaneously after some time delay

24
Q

Domain Name System (DNS) spoofing

A

assuming the DNS name of another system by either corrupting the name service cache of a victim system, or by compromising a domain name server for a valid domain

25
DSL
Digital Subscriber Line Internet connectivity. provides the user with dedicated bandwidth
26
Dumpster diving
going through trash bins to search for papers with employee and department names, administration codes, specifics about the companies network environment, and other useful information
27
Dynamic NAT
the router maintains a list of internal addresses and a list of external addresses that are dynamically mapped to each otehr
28
Email attachment
files sent with emails that may contain malware (may allow malicious code to enter a desktop)
29
Email bombs
large quantity of bulk email that overwhelms an email server preventing user access
30
Egress filters
ensures that packets with source address of the internal network cannot originate form a remote location
31
Encryption
a process of encoding messages to keep them secret, so only "authorized" parties (with secret key or password) can read it
32
EULA
End User License Agreement. | contract between you and the software's vendor or developer.
33
Exception policy
provides the ability to exclude applications and processes from detection by the virus and spyware scans and by SONAR
34
Extranet
Similar to Intranet, but is accessible by two or more parties. When two companies/partners need to communicate and collaborate a lot, they connect their networks together. (like a sharepoint(?))
35
Fails over
refers to the process of reconstructing a system or switching over to other systems when a failure is detected
36
False Accept Rate
measures the likelihood that a user will claim a false identity and be accepted
37
False Acceptance
where an unauthorized user is identified as an authorized user
38
False Reject Rate
Measures the likelihood that a system will incorrectly deny the user
39
Faraday Cage
can be used to prevent interferences and emissions
40
Fast flux
DNS technique used by botnets to hide phasing and malware delivery sites behind an ever-changing network of comprised hosts acting as proxies
41
FAT virus
ruin your file allocation system (can also destroy files and entire directories for them)
42
Fault tolerance
primarily the ability of a system to sustain operations in the event of a component failure
43
FDE
Full Disk Encryption. Automatically converts data on a hard drive into a form that cannot be understood by anyone who does not have the decryption key
44
Fiber Optics
allows for the longest distances and highest transmission speeds, and is the most secure type of network cabling
45
File infector virus
a virus that attaches itself to executable files. when the infected executable files runs, the virus copies itself to memory. later the virus attaches itself to other executable files
46
Firewall
part of a computer system that is designed to block unauthorized access
47
Firewall analyzer
helps network security administrators and IT managers for bandwidth monitoring and Firewall Internet security events monitoring efficiently
48
Firewall policy
an addition to security policy that describes how firewalls should handle application traffic (such as Web or email applications)
49
Flooding
type of incident involving insertion of a large volume of data resulting in denial of service
50
FTP
file transfer protocol. | used to upload or download files