FBLA Practice Flashcards

(67 cards)

1
Q

IBM, Microsoft, and Novell universal biometric standard

A

Bio API

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Attack type that relies on trust and deception

A

Social Engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How can you prevent intruders from accessing your wireless network?

A

Restrict to known MAC addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Microsoft Passport is what?

A

Single Sign-On

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Computer system designed to trap intruders

A

Honeypot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Stateful Inspection

A

Compares parts of a packet to trusted information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

TCP

A

Internet protocol to get data from one device to another (Transmission Control Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

UDP

A

Protocol for information without a response, like streaming (User Datagram Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

ICMP

A

Router to Router Protocol (Internet Control Message Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

SMTP

A

Email or text transfer protocol (Simple Mail Transfer Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

SNMP

A

Used to collect system info from a remote computer (Simple Network Management Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Telnet

A

Used to preform commands on a remote machine (often insecure)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Application Backdoor

A

Hidden access coded in by developer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

SMTP Session Hijacking

A

Allows access to email addresses and therefore spam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Email Bomb

A

Large quantity of email to overwhelm server, prevents access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Redirect bomb

A

Attack using ICMP to change the path of information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Source Routing

A

Controlling the path of a packet from the source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Proxy Server

A

Server that local packets go through before internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Adware

A

Malware the displays ads, often collecting personal info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Attack

A

Bypassing security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Audit trail

A

Recording showing who and what a user did on a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Authentication

A

Verifying a user’s identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Blended threat

A

Combining types of malware to inflict maximum damage, such a trojan horse worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Dictionary Attack

A

Using a list of words to try and find a password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Brute-force attack
Using every possible possible password combination
26
EULA
End User License Agreement
27
Flooding
Denial of Service through sending large amounts of data
28
Pharming
Like Phishing, except done through DNS poisoning (redirecting a user through false information put into a DNS server)
29
RADIUS
Authentication service used by ISPs to manage access to the ISP system
30
Retro-Virus
Infects all backup media to ensure you cannot restore system
31
Rootkit
Allows complete access to a system with a hidden presence
32
Smurfing
Denial of service attack using ICMP and a Smurfed IP address, exploits Echo requests
33
Spyware
Hidden components of software that harvest personal information
34
Threat
Anything that has the potential to attack or threaten a system
35
Vulnerability
Something that a threat can exploit to carry out an attack
36
Worm
Self Replicating program, often used to clog networks through its spread
37
Worm
Self Replicating program, often used to clog networks through its spread
38
APT
Advanced Persistent Threat, coordinated, complex, and long term threat
39
Air Gap
Physically Isolation of a network
40
Asymmetric Cryptography
Private/Public Key Cryptography, Must use both keys, allows no shared secrets
41
Botnet
Multiple computers AKA zombies, controlled by single entity, used for DDoS,
42
CERT
Computer Emergency Response Team, often government or corporate run teams of cybersec. expertise
43
Conflicker
2008 Computer Worm, noteworthy for large size of botnet and international response
44
DNS
Domain Name System, translates IP addresses into words
45
FedRAMP
Federal Risk and Authorization Management Program, 2012 Program that allowed 1 certification for all US Civilian Government Work
46
FedRAMP
Federal Risk and Authorization Management Program, 2012 Program that allowed 1 certification for all US Civilian Government Work
47
GhostNet
1295 computer botnet, spread over 103 countries, discovered 2004, most likely used by China to target the West
48
ICS
Industrial Control System, runs large scale industry, such as factories, to pipelines
49
ISAC
Information Sharing and Analysis Center, Hub to share information with an industry for critical infrastructure
50
Integrity Attack
An attack for changing data, rather than extracting it
51
ICANN
Internet Corporation for Assigned Names and Numbers, 1998 Nonprofit took over US Gov. control of DNS and Internet Policy
52
ITU
1865 Founded UN Agency in charge of Telecommunications (International Telecommunications Union)
53
IETF
Internet Engineering Task Force, developed standards and protocols, part of ISOC
54
ISOC
Internet Society, group of agencies in charge of developing internet policy
55
NIST
US Commerce Department, develops industry standards
56
Operation Orchard
2007 Israeli strike on Syrian Nuclear Research
57
Operation Shady RAT
2006 Series of Cyber attacks, comprised confidential information of 70+ major firms and agencies
58
Red team
Simulated attack group of white hat hackers
59
Root access
Ability to change every file on a system
60
SIPRNet
Secure Internet Protocol Router Network, US Military Classified INTRAnet, uses common Internet Protocol
61
SCADA
Supervisory Control and Data Acquisition, Industrial Control System to manage sensors and control large facilities
62
TOR
The Onion Router, used to provide online anonymity, developed by US Gov. now volunteer run
63
SQL
Structured Query Language, used to access and manage databases in servers
64
SQL Injection
Using a website to pass SQL code to gain access to a database and the information within
65
typosquatting
registering domain names that may be close to the original (fisney instead of disney)
66
Watering Hole
Attack on a specific group by compromising website used frequently by members of that group
67
Zero Day
Exploits a previously unknown vulnerability, "zeroth day of awareness"