Practice 5 COPY Flashcards

1
Q

UPS

A

Uninterruptible power supply

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

VNC

A

Virtual Network Client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

TACACS+

A

Terminal Access Controller Access-Control System Plus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

RADIUS

A

Remote Access Dial In User Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

RADIUS

A

Remote Access Dial In User Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

ISAKMP

A

Internet Security Association and Key Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

ISAKMP

A

Internet Security Association and Key Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

PCI-DSS

A

Payment Card Industry Data Security Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

PCI-DSS

A

Payment Card Industry Data Security Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

AES

A

Advanced Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

COBO
CYOD
COPE
BYOD

A

Company Owned/Business Only
Choose Your Own Device
Company Owned/Personally Enabled
Bring Your Own Device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

AES

A

Advanced Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A significant over-voltage event that occurs for a very short period of time. Usually lasts for less than three nanoseconds.

A

Power Spike

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A sudden increase in voltage that lasts for three nanoseconds or more.

A

Power Surge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A total loss of power

A

Power Failure/Loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

DLP

A

Data Loss Prevention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The shape or structure of a network in a physical or logical format as depicted in a network diagram.

A

Network Topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

When a vender is aware of a security flaw, but a patch has not been developed, a malicious actor can craft an attack and take advantage of the vulnerability. What type of attack is this?

A

Zero-Day

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A physical security access control system comprising a small space with two sets of interlocking doors, such that the first set of doors must close before the second set opens.

A

Access Control Vestibule

20
Q

A placeholder in a script containing a number, character, or string of characters. They do not have to be declared but can be assigned a value

21
Q

A hardware token that generates a random number code synchronized to a code on the server. The code changes every 60 seconds or so.

22
Q

A small device that can operate with or without an operating system installed on the client device. This device can instead boot directly from a network-based operating system on a common server and access applications on the company’s application server.

A

Thin Client

23
Q

RFC

A

Request for Change

24
Q

When a scammer pretends to be someone else to steal data or money or to spread malware

25
AAA
Accounting, Authorization, and Authentication
26
A AAA (Accounting, Authorization, and Authentication) protocol to provide AAA services for access to routers, network access points, and other networking devices.
TACACS+ (Terminal Access Controller Access-Control System Plus)
27
TACACS+
Terminal Access Controller Access-Control System Plus
28
NAT
Network Address Translation
29
A network service provided by a router or a proxy server to map private local addresses to one or more publicly accessible IP addresses
Network Address Translation (NAT)
30
UPnP
Universal Plug-and-Play
31
A protocol framework allowing network devices to autoconfigure services, such as allowing a games console to request appropriate settings from a firewall.
Universal Plug-and-Play (UPnP)
32
Are Hub-and-Spoke and Mesh networking models used in workgroups or domains?
No
33
ICSSPLOIT
Industrial Control System Exploitation
34
What is used to identify the host identifier and the network identifier uniquely in combination with the IP address?
Subnet Mask
35
GDPR
General data Protection Regulation
36
A regulation created in the European Union that creates provisions and requirements to protect the personal data of European Union citizens
General Data Protection Regulation (GDPR)
37
This happens when the humidity is too low in a server room
Electrostatic Discharge
38
ARP
Address Resolution Protocol
39
The sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices.
Bluejacking
40
The first 512-byte sector of a hard disk
Master Boot Record (MBR)
41
MBR
Master Boot Record
42
PCI-DSS
Payment Card Industry Data Security Standard
43
AES
Advances Encryption System
44
An attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other
On-Path Attack
45
A local plain text file that maps servers or hostnames to IP addresses.
hosts.ini
46
Attackers often modify which file to redirect users to a malicious website instead of one they would commonly use.
hosts.ini