Chapter 8 Flashcards

1
Q

privilege escalation

A

The act of exploiting a bug or design flaw in a software or firmware
application to gain access to resources that normally would’ve been protected from
an application or user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

radio frequency interference (RFI)

A

Interference that can come from AM/FM transmissions
and cell towers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

crosstalk

A

When a signal transmitted on one copper wire creates an undesired effect on
another wire; the signal “bleeds” over, so to speak.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

data emanation (or signal emanation)

A

The electromagnetic field generated by a network
cable or network device, which can be manipulated to eavesdrop on conversations
or to steal data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Faraday cage

A

An enclosure formed by conducting material or by a mesh of such material;
it blocks out external static electric fields and can stop emanations from cell phones
and other devices within the cage from leaking out.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

butt set (or lineman’s handset)

A

A device that looks similar to a phone but has alligator
clips that can connect to the various terminals used by phone equipment, enabling a
person to listen in to a conversation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

TEMPEST

A

Refers to the investigations of conducted emissions from electrical and mechanical
devices, which could be compromising to an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

wiretapping

A

Tapping into a network cable in an attempt to eavesdrop on a conversation
or steal data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

protected distribution system

A

Security system implemented to protect unencrypted
data transfer over wired networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Wi-Fi Protected Setup (WPS)

A

A simplifi ed way of connecting to wireless networks
using an eight-digit code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Advanced Encryption Standard (AES)

A

An encryption standard used with WPA and
WPA2. The successor to DES/3DES and is another symmetric key encryption standard
composed of three different block ciphers: AES-128, AES-192, and AES-256.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Temporal Key Integrity Protocol (TKIP)

A

An algorithm used to secure wireless computer
networks; meant as a replacement for WEP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

AP isolation

A

Each client connected to the AP will not be able to communicate with
each other, but they can each still access the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

IV attack

A

type of related-key attack, which is when an attacker observes the operation
of a cipher using several different keys and fi nds a mathematical relationship
between them, allowing the attacker to ultimately decipher data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly