Term
|
Definition
A ____'s main function is to examine packets and determine where to direct them based on their Network layer addressing information. |
|
|
Term
|
Definition
Network security is more often compromised “from the inside” than from ______ sources |
|
|
Term
|
Definition
Human errors, ignorance, and omissions cause more than half of all security______ sustained by networks. |
|
|
Term
|
Definition
____ protocols are the rules that computers follow to accomplish authentication. |
|
|
Term
|
Definition
In ____ authentication, both computers verify the credentials of the other. |
|
|
Term
|
Definition
In a ____-in-the-middle attack, a person redirects or captures secure transmissions as they occur |
|
|
Term
|
Definition
In DNS ____ , a hacker forges name server records to falsify his host’s identity. |
|
|
Term
|
Definition
A ____ attack occurs when a system becomes unable to function because it has been deluged with data transmissions or otherwise disrupted. |
|
|
Term
|
Definition
____ is a method of encrypting TCP/IP transmissions. |
|
|
Term
|
Definition
Port ____ software searches a node for open ports. |
|
|
Term
|
Definition
A ____ attack occurs when an Internet chat user sends commands to a victim’s machine that cause the screen to fill with garbage characters and requires the victim to terminate their chat sessions |
|
|
Term
|
Definition
A VPN ____ authenticates VPN clients and establishes tunnels for VPN connections. |
|
|
Term
|
Definition
A digital ____ is a password-protected and encrypted file that holds an individual’s identification information, including a public key. |
|
|
Term
|
Definition
The combination of a public key and a private key is known as a ____ pair. |
|
|
Term
|
Definition
____ is a social engineering practice in which a person attempts to glean access or authentication information by posing as someone who needs that information. |
|
|
Term
|
Definition
____ is a public key encryption system that can verify the authenticity of an e-mail sender and encrypt e-mail data in transmission. |
|
|
Term
|
Definition
RADIUS and TACACS belong to a category of protocols known as AAA (authentication, authorization, and ____). |
|
|
Term
|
Definition
A ____ force attack occurs when a hacker tries numerous possible character combinations to find the key that will decrypt encrypted data. |
|
|
Term
|
Definition
A ____-filtering firewall is a router (or a computer installed with software that enables it to act as a router) that examines the header of every packet of data it receives to determine whether that type of packet is authorized to continue to its destination. |
|
|
Term
|
Definition
The use of certificate authorities to associate public keys with certain users is known as ____. |
|
|
Term
|
Definition
A ____ attack occurs when a hacker uses programs that try a combination of a user ID and every word in a dictionary to gain access to the network. |
|
|
Term
|
Definition
A _______ policy does not state exactly which hardware, software, architecture, or protocols will be used to ensure security. |
|
|