Chapter 10 vocab Flashcards

1
Q

Tricking a victim into revealing sensitive information under false pretenses.

A

Pretexting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Exploiting a victim using email messages.

A

Email Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Convincing a victim that they are performing a legitimate task within their web browser window when, in fact, they are being tricked into revealing sensitive information or installing malware on their computer.

A

Browser Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An attack where the attacker secretly relays and possibly alters the communications between two parties who believe they are directly communicating with each other.

A

Man-in-the-Middle Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An attempt to connect to a server by capturing and resending authentication information.

A

Replay Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An attack that attempts to overload a system so that the services it provides are no longer available to legitimate network clients.

A

Denial of Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Software designed to infiltrate or damage a computer system without the owner’s consent or knowledge.

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An event in which a hacker tries to gain access to a secure account, such as an email or bank account, in order to steal personal information.

A

Password Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A type of authentication that requires the user to provide something that they know, such as a password or PIN.

A

Type 1 Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A type of authentication that requires the user to provide something that they have, such as a key fob, electronic chip, or smart card.

A

Type 2 Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A type of authentication that requires the user to provide something that they are, such as a fingerprint, handprint, retinal pattern, face, or voice.

A

Type 3 Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Authentication that requires two or more evidences of authentication, usually of different types.

A

Multifactor Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A method of authenticating with one system to gain access to other related systems.

A

Single Sign-on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A type of access control where a user has complete control over a resource, and also determines the permissions other users have to those resources.

A

Discretionary Access Control (DAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A type of access control that restricts access based on the user’s role in an organization.

A

Role-based Access Control (RBAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A type of access control that historically was associated with multilevel security and military systems and may use a security clearance to restrict access to resources. The security manager controls the security policy, and users aren’t able to override the policy.

A

Mandatory Access Control (MAC)

17
Q

The process of encoding or translating data into another form so that only the intended recipient can decrypt and read the data.

A

Data Encryption