terms Flashcards

1
Q

is the transfer of information from one point to another; consist of message, sender, medium, receiver

A

Data communications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

information that has been processed and organized, it can be alphabetical, numeric, or symbolic information

A

Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

single transmission line; one bit is transmitted at one time; long distance communications; (serial-by-bit transmission)

A

Serial Data Transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

transfer data on a parallel link, a separate line is used as a clock signal; data transmission speed is high

A

Parallel Data Transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

involves only two locations or stations.

A

Two-point configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

involves three or more stations or terminals.

A

Multipoint configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

is when signals travel in one direction only.

A

Simplex

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

is when signals travel in both directions, but one at a time

A

Half duplex

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

is a two-way communications and signals travel in both directions simultaneously.

A

Full duplex

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

corrupted data during transmission.

A

Error

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

only one bit is going to be changed.

A

Bit error

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

is a change in two or more bits.

A

Multiple Bit error

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

change in more than 1 consecutive bits.

A

Burst error

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

the process of monitoring the received data and determining when a transmission error occurred.

A

Error detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

also known as parity check; it can detect single bit error.

A

VRC (VERTICAL REDUNDANCY CHECK)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

also called as the two-dimensional parity; the parity bit is appended to every data block whereas in LRC, a block data bit is organized in rows and columns.

A

LRC (LONGITUDINAL REDUNDANCY CHECK)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

it can detect all errors involving an odd number of bits; it can detect errors involving an even number of bits.

A

CHECKSUM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

perform binary division operation.

A

CRC (CYCLIC REDUNDANCY CHECK)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

detects and corrects transmission errors at the receive end without calling for retransmission; bits are added to message prior to transmission.

A

Forward Error Correction (FEC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

dependent on the number of bits in the data character.

A

HAMMING CODE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

metallic circuit formed by two conductors insulated from each other; it uses one line for transmission of electric waves in both directions.

A

Two - Wire Circuit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

two-way circuit using two paths so arranged that communication currents are transmitted in one direction only on one path, and in the opposite direction on the other path.

A

Four - Wire Circuit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Computer, Network Printers, VoIP Phones, Telepresence endpoint, Security Cameras, Mobile handled phones

A

END NODE DEVICES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

switches, wireless access point, routers, security devices (Firewall), bridges, hubs, repeaters, cell tower

A

INTERMEDIARY NODES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

ethernet, fiber optic cable, coaxial cable, USB cable

A

Wired Media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

infrared, radio, microwaves, satellite

A

Wireless Media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

email, storage services, file sharing, instant messaging, online game, voice over IP, video telephony, world wide web

A

Services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

physical layout of nodes on a network

A

Physical topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

consists of a single cable-called a backbone-connecting all nodes on a network without intervening connectivity devices

A

Bus topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

each node is connected to the two nearest nodes so the entire network forms a circle; one method for passing data on ring networks is token passing

A

Ring topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

every node on the network is connected through a central device called hub or switch.

A

Star topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

each computer connects to every other; high level of redundancy.

A

Mesh Topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

is a combination of Bus and Star topology.

A

Tree topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

it is a set of rules and configurations designed to protect the integrity, confidentiality and accessibility of computer networks and data.

A

Network security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

protect the data that has been transmitted.

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

ensuring that information cannot be modified without detection

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

ensuring information can be accessed when needed

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

potential for violation of security; action or event that could breach security and cause harm.

A

Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

an assault on system security that derives from an intelligent threat.

A

Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

action that compromises the security

A

Security attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

detect, prevent, or recover from a security attack.

A

Security mechanism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

enhance the security, counter security attacks and provide the service.

A

Security service

43
Q

attempts to learn or make use of information from the system

A

PASSIVE ATTACK

44
Q

going to understand or know what is the data that is being transmitted between the sender and the receiver

A

Release of message contents

45
Q

going to observe the pattern of messages from sender and the receiver.

A

Traffic analysis

46
Q

involve some modification of the data stream or the creation of a false stream.

A

ACTIVE ATTACK

47
Q

is an attack that uses a fake identity

A

Masquerade

48
Q

detects a data transmission and fraudulently has it delayed or repeated.

A

Replay

49
Q

attack on the integrity of the original data.

A

Modification of messages

50
Q

attack meant to shut down a machine or network, making it inaccessible to its intended users.

A

Denial of Service

51
Q

to give a specific kind of protection to system resources; implement security policies by security mechanisms.

A

SECURITY SERVICES

52
Q

assurance that the communicating entity is the one that it claims to be.

A

Authentication

53
Q

provided for use at the establishment of, or at times during the data transfer phase of, a connection.

A

Peer Entity Authentication

54
Q

is a property that a message has not been modified while in transit.

A

Data Origin Authentication

55
Q

dictates who’s allowed to access; is a security measure which is put in place to regulate the individuals that can view, use, or have access to a restricted environment.

A

Access Control

56
Q

deals with protecting against the disclosure of information by ensuring that the data is limited to those authorized.

A

Data Confidentiality

57
Q

refers to the accuracy and consistency of data stored in a database.

A

Data Integrity

58
Q

refers to the assurance that the owner of a signature key pair cannot convincingly deny having signed the data.

A

Non-Repudiation

59
Q

deals with hiding and covering of data which helps data to become confidential.

A

Encipherment

60
Q

cryptographic value that is calculated from the data and a secret key known only by the signer.

A

Digital signature

61
Q

intended to ensure the identity of an entity by means of information exchange.

A

Authentication exchange

62
Q

produces cipher text output continuously, even in the absence of the plain text.

A

Traffic padding

63
Q

means selecting and continuously changing different available routes between sender and receiver.

A

Routing control

64
Q

involves use of trusted third party in communication.

A

Notarization

65
Q

is perceived to be correct with respect to some criteria

A

Trusted functionality

66
Q

the marking bound to a resource that names or designates the security attributes of that resource.

A

Security label

67
Q

detection of security-relevant events.

A

Event detection

68
Q

data collected and potentially used to facilitate a security audit.

A

Security audit trail

69
Q

deals with requests from mechanism, such as event handling and takes recovery actions.

A

Security recovery

70
Q

is the science of secret, or hidden writing.

A

Cryptography

71
Q

practice of hiding messages

A

Encryption

72
Q

is a method for encrypting messages.

A

Cipher

73
Q

the key for encryption and decryptions are the same.

A

Symmetric Algorithms

74
Q

encrypt data one block at a time (typically 64 bits, or 128 bits); used for a single message.

A

Block Ciphers

75
Q

encrypt data one bit or one byte at a time; used if data is a constant stream of information.

A

Stream Ciphers

76
Q

is determined by the size of the key.

A

Key Strength

77
Q

is a method in which each letter in the alphabet is rotated by three letters.

A

Caesar Cipher

78
Q

uses a sequence of monoalphabetic ciphers in tandem; (Blaise de Vigenere)

A

Polyalphabetic Caesar Cipher

79
Q

this involves rearrangement of characters on the plain text into columns.

A

Columnar Transposition

80
Q

the amount of secrecy needed should determine the amount of labor appropriate for the encryption and decryption.

A

Shannon’s Characteristics of “Good” Ciphers -

81
Q

it is based on sound mathematics.

A

Properties of Trustworthy Systems

82
Q

is the process of breaking an encryption code.

A

CRYPTANALYSIS

83
Q

goal of DES is to completely scramble the data and key so that every bit of cipher text depends on every bit of data and every bit of key

A

Data Encryption Standard (DES)

84
Q

Any exposure to the secret key compromise secrecy of ciphertext; a key needs to be delivered to the recipient of the coded message for it to be deciphered.

A

Symmetric Encryption

85
Q

uses a pair of keys for encryption (Public key for encryption & Private key for decryption).

A

Asymmetric Encryption

86
Q

developed by Ron Rivest, Adi Shamir, Len Adelman; both public and private key are interchangeable; variable Key Size (512, 1024, or 2048 buts); most popular public key algorithm.

A

RSA

87
Q

developed by Taher ElGamal; variable key size (512 or 1024 bits); less common than RSA, used in protocols like PGP

A

El Gamal

88
Q

hacker could generate a key pair, give the public key away and tell everybody, that it belongs to somebody else.

A

Man-in-the-middle Attack

89
Q

used to improve efficiency.

A

Session-Key Encryption

90
Q

Pretty Good Privacy (PGP), Secure/Multipurpose Internet Mail Extension (S/MIME), Secure Socket Layer (SSL) and Transport Layer Socket (TLS).

A

Encryption Protocols

91
Q

is a method to create secret key by exchanging only public keys.

A

Key Agreement

92
Q

is the process of validating the identity of a user or the integrity of a piece of data.

A

Authentication

93
Q

is a fingerprint for a document.

A

Message digest

94
Q

a message digest created with a key.

A

Message Authentication Codes

95
Q

password is secret character string only known to user and server.

A

Password Authentication

96
Q

set of rules that governs the communication of data related to authentication between the server and the user

A

Authentication Protocols

97
Q

is an authentication service that uses symmetric key encryption and a key distribution center.

A

Kerberos

98
Q

are hardware devices that generate unique strings that are usually used in conjunction with passwords for authentication.

A

Personal Tokens

99
Q

uses certain biological characteristics for authentication (Fingerprint, Voice, Handwriting, Face, Hand Geometry Recognition, Retinal Scan).

A

Biometrics

100
Q

scanning process takes advantage of the natural patterns in people’s irises, digitizing them for identification purposes.

A

Iris Recognition

101
Q

is a data item which accompanies or is logically associated with a digitally encoded message

A

Digital Signature

102
Q

is a signed statement by a trusted party that another party’s public key belongs to them.

A

Digital Certificate

103
Q

is the practice of signing a certificate with another private key that has a certificate for its public key.

A

Certificates Chaining