Cards #151 - 200 Flashcards

(35 cards)

1
Q

Full backup

A

complete, comprehensive backups of all files on a disk of server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Gateway

A

a bridge between two network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Hacker

A

unauthorized user who attempts to or gains access to an information system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Harassing

A

subject to aggressive pressure or intimidation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Hardware security

A

can be composed of adding cable locks to computers o prevent thieves from walking out with copies of customer database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Hash function

A

use one key for encryption and another for decrypting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Honeypot

A

computer system on the internet that is expressly set up to attract and “trap” intruders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Host integrity

A

the ability to define, enforce, and restore the security of client computers to keep enterprise networks and data secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Host-based IDS

A

a software application installed on a system and monitors activity only on the local system (rely on information from audit and system log files to detect intrusion)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Hot site

A

up and operational 24/7 and would be able to take over functionally form a primary site within minutes of a primary site failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How does NAT server help protect your network?

A

masking the IP addresses of internal computers from the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How does spyware differ from other forms of malware, such as worms and viruses

A

Not all spyware is malicious

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

HTTP

A

Hyper-Text Transfer Protocol. Used for websites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

HTTPS

A

Hyper-Text Transfer Protocol over Secure Socket Layer. authentication of the server, the data transmitted over a HTTPS connection is encrypted and confidential

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ICMP

A

Internet Control Message Protocol. used by a router to exchange information with other routers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Identification

A

identifying a person

17
Q

Implicit deny

A

indicates that unless something is specifically allowed, it is denied

18
Q

Bottleneck route

A

a network route that goes nowhere

19
Q

RAID 1

A

data written identically to two drives, therefore producing a mirrored set

20
Q

Incremental Backup

A

partial backup that stores only the info that has changed since the last full or incremental backup

21
Q

Ingress filters

A

ensures that only packets with a valid source address from the originating network are allowed to pass

22
Q

Instant Message

A

common communication using a computer. Opens listening ports on the computer, hence makes it vulnerable to network attacks and software exploits.

23
Q

Internet

A

a global network connecting millions of computers; has more than 200 million users worldwide, and that number if growing rapidly

24
Q

In-Private Filtering

A

filter potential unsafe websites you browse

25
Internet Key Exchange (IKE) protocol
Standard key exchange protocol for IPSec. COnsists of the Internet Security Association and Key Management Protocol
26
ISAKMP
Internet Security Association and Key Management Protocol. defines the procedures for peer authentication, the SA handshake process, and algorithms and key sizes
27
Intranet
A small private piece of 'Internet' that is accessible only to users within the organization.
28
Intrusion
Unauthorized act of bypassing the security mechanisms of a system
29
Intrusion Detection System (IDS)
monitors and analyzes traffic on a network or activity on a system in an attempt to detect malicious activity. Logs the event, stores relevant data/traffic, notifies an administrator, an din some cases it will try to intervene
30
Intrusion prevention policy
automatically detects and blocks network attacks and attacks on browsers as well as protects applications from vulnerabilities
31
IP
Internet Protocol. The main delivery system for information over the Internet
32
IP Addresses
a unique address that identifies a device on the internet or a local network
33
IPSec
Internet Protocol Security. A popular and complete encryption framework for IP networks that provides end-to end security at the Network layer. It provides data confidentiality, data integrity, and authentication of data origin
34
ISP
Internet Service Provider. a company that provides individuals and other companies access to the internet and other related services
35
Java
an object-oriented programming language developed by Sun Microsystems. It is platform-independent, which makes it suitable for writing Internet application