IT Vocab 12 Flashcards

1
Q

An early example of encryption used by Julius Caesar to send confidential military messages

A

Caesar Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Authentication that requires two or more evidences of authentication, usually of different types

A

Multifactor Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Data that are being transported from one device to another, whether by radio, electrical, or light signals

A

Data in Transit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A type of access control that restricts access based on the user’s role in an organization

A

Role-based Access Control (RBAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Convincing a victim that they are performing a legitimate task within their web browser window when, in fact, they are being tricked into revealing sensitive information or installing malware on their computer

A

Browser Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A device that controls the flow of network traffic to protect systems from unauthorized network connections

A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An attack that attempts to overload a system to that the services it provides are no longer available to legitimate network clients

A

Denial of Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An attack where the attacker secretly relays and possibly alters the communications between two parties who believe they are directly communicating with each other

A

Man-in-the-Middle Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The process of keeping track of user activity while attached to a system

A

Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Software that helps remove unwanted, unsolicited email

A

Anti-Spam Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The capturing and storing of computer and user events

A

Logging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

An attribute used to classify information based on the risk of public disclosure

A

Information Sensitivity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A method of authenticating with one system to gain access to other related systems

A

Single Sign-on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A type of authentication that requires the user to provide something that they know, such as a password or PIN

A

Type 1 Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A type of authentication that requires the user to provide something that they have, such as a key, fob, electronic chip, or smart card

A

Type 2 Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

TCP session hacking and other methods where an attacker takes over the communication to a server by appearing to be the victim

A

Impersonation

17
Q

A type of authentication that requires the user to provide something that they are, such as a fingerprint, handprint, retinal pattern, face, or voice

A

Type 3 Authentication

18
Q

Data in a persistent storage medium, such as a hard drive or optical disc

A

Data at rest

19
Q

An attempt to connect to a server by capturing and resending authentication information

A

Replay attack

20
Q

The ability to ensure that someone can’t deny that they performed a certain act

A

Non-repudiation

21
Q

A type of access control where a user has complete control over a resource and also determines the permissions other users have to those resources

A

Discretionary Access Control (DAC)

22
Q

Software that helps protect against malicious software infections

A

Anti-Malware Software

23
Q

A type of access control that historically was associated with multilevel security and military systems and may use a security clearance to restrict access to resources. The security manager controls the security policy, and users aren’t able to override the policy

A

Mandatory Access Control (MAC)

24
Q

Exploiting a victim using email messages

A

Email Attack

25
Q

The buying and selling of products or services electronically, typically through the Internet

A

Ecommerce

26
Q

A security concern regarding network devices and other devices, such as smartphones, that give the option of using the device without a password

A

Device Password