Term
What ensures that the information is correct and no unauthorized person or malicious software has altered the data?(Page 10) |
|
Definition
|
|
Term
What involves using someone's personal information such as a Social Security number,to establish bank or credit card accounts that are then left unpaid, leaving the victim with the debt and ruining their credit rating? (Page 13) |
|
Definition
|
|
Term
Targeted attacks against financial networks,unauthorized access to information, and the theft of personal information is sometimes known as what? (Page 18) |
|
Definition
|
|
Term
What is a software program that delivers advertising content in a manner that is unexpected and unwanted by the user? (Page 52) |
|
Definition
|
|
Term
What is a single, dedicated hard disk-based file storage device that provides centralized and consolited disk storage available to LAN (Local Area Network) users through a standard network connection? (Page 57) |
|
Definition
Network Attached Storage(NAS) |
|
|
Term
When an entire operating system environment is simulated, this is known as what? (Page 59) |
|
Definition
Operating system virtualization |
|
|
Term
When this technology enables a virtual machine to be moved to a different physical computer with no impact to the user-the virtual machine stores it current state on to a share storage device immediately before ___________ occurs. (Page 61) |
|
Definition
|
|
Term
Live migration can also be used for_____if the demand for a service or application increases then network managers can quickly move this high-demand virtual machine to another physical server with more RAM(Random Access Memory) or CPU (Central processing Unit) resources. (Page 61) |
|
Definition
|
|
Term
What is a Windows Vista and Windows XP Service Pack 2(SP2) feature that prevents attackers from using buffer overflow to execute malware? (Page 86) |
|
Definition
Data Execution Prevention (DEP) |
|
|
Term
What is configuration baseline?(Page 88) |
|
Definition
This is when the operating system configuration settings that will be used for each computer in the organization. |
|
|
Term
What is a computer programming language that is typically interpreted into a language the computer can understand? (Page 90) |
|
Definition
|
|
Term
What allows the administrator to configure the switch to redirect traffic that occurs on some or all ports to a designated monitoring port on the switch? (Page 121) |
|
Definition
|
|
Term
What makes a copy of the transmission before sending it to the recipient? (Page 131) |
|
Definition
|
|
Term
What is the most common protocol suite used today for networks as well as the Internet? (Page 131) |
|
Definition
Transmission Control Protocol/Internet Protocol(TCP/IP) |
|
|
Term
When TCP/IP was developed, the host table concept was expanded to a hierarchical name system known as the what? (Page 132) |
|
Definition
|
|
Term
What enables the attacker's computer to foward any network traffic it receives from Computer A to the actual router? (Page 136) |
|
Definition
|
|
Term
When a group of piconets in which connections exists between different piconets is called what? (Page 140) |
|
Definition
|
|
Term
What is connected directly to the devices on the network? (Page 156) |
|
Definition
|
|
Term
What is used mainly by organizations to capture limited information regarding attacks on that organizations honey-pot? (Page 170) |
|
Definition
|
|
Term
What monitors Internet traffic and blocks access to preselected Web sites and files? (Page 174) |
|
Definition
Internet Content Filters(ICF) |
|
|
Term
What standard specifies a maximum speed of 54 Mbps using the 5GHz spectrum? (Page 192) |
|
Definition
|
|
Term
At regular intervals (normally every 100 microseconds) a wireless AP sends a _______ frame to announce its presence and to provide the necessary information for devices that want to join the network this is called what? (Page 138) |
|
Definition
|
|
Term
In 2002 the WECA organization changed its name to which reflected the name of the certification that it uses (Wi-Fi) to verify that a product follows IEEE standards.(Page 203) |
|
Definition
Wi-Fi(Wireless Fidelity)Alliance |
|
|
Term
Access points have a setting called ________ ,which is what the PSK uses as a seed value to generate new keys. (Page 203) |
|
Definition
|
|
Term
WPA replaces WEP with an encryption technology called what? (Page 203) |
|
Definition
Temporal Key Integrity Protocol (TKIP) |
|
|
Term
What allows a device to become authenticated to an AP(Access Point) before moving into range of the AP(Access Point) |
|
Definition
|
|
Term
The third access control model is considered a more "real world" approach than the other models what is this model called? (Page 232) |
|
Definition
Role Based Access Control (RBAC) |
|
|
Term
What practice requires that if the fraudulent application of a process could potentially result in a breach of security, then the process should be divided between two or more individuals? (Page 233) |
|
Definition
|
|
Term
What makes password attacks easier by creating a large pregenerated data set of hashes from nearly every possible password combination? (Page 240) |
|
Definition
|
|
Term
What kind of combination locks use buttons that must be pushed in the proper sequence to open the door? (Page 246) |
|
Definition
|
|
Term
What is a decentralized open source FIM(Federated Identity Management) that does not require specific software to be installed on the desktop? (Page 277) |
|
Definition
|
|
Term
The International Organization for Standardization (ISO) created a standard for directory services known as? (Page 281) |
|
Definition
|
|
Term
What takes a snapshot of the security of the organization as it nows stands? (Page 308) |
|
Definition
|
|
Term
What does open port mean? (Page 313) |
|
Definition
It means that the application or service assigned to that port is listening |
|
|
Term
What protocol provides support to IP in the form of ___________ messages that allow different types of communication to occur between IP devices? (Page 314) |
|
Definition
Internet Control Message Protocol (ICMP) |
|
|
Term
What is a genric term that refers to a range of products that looks for vulnerabilities in networks or systems? (Page 317) |
|
Definition
|
|
Term
Who periodically reviews security settings and maintains records of access by end users? (Page 228) |
|
Definition
|
|
Term
Premission given to a higher level"parent"will also be __________ by a lower level"child" (Page 339) |
|
Definition
|
|
Term
What is designed for detecting statistical anomalies? (Page 338) |
|
Definition
|
|
Term
_______ also called one-way _____ is a process for creating a unique "signature" for a set of data. (Page 371) |
|
Definition
|
|
Term
The simplest type of stream cipher is a ? (Page 376) |
|
Definition
|
|
Term
What is a block cipher that processes blocks of 64 bits? (Page 381) |
|
Definition
|
|
Term
The asymmetric algorithm RSA was published in 1977 who patented it and what year was it? (Page 385) |
|
Definition
|
|
Term
What is essentiaaly a chip on the motherboard of the computer that provides cryptographic services? (Page 388) |
|
Definition
Trusted Platform Module (TPM) |
|
|
Term
When Bob sends one digtal certificate to Alice along with his message, what is this known as? (Page 407) |
|
Definition
|
|
Term
What has multiple CA's that sign digital certificates |
|
Definition
|
|
Term
What sprays the area with pressurized water? (Page443) |
|
Definition
|
|
Term
What does not harm people, document, or electrical equipment in the room? (Page443) |
|
Definition
|
|
Term
A system of hard drives based on _____________ can be achieved through using a technology known as what? (Page 448) |
|
Definition
RAID (Redundant Array of Independent Drives) |
|
|
Term
What refers to a methodology for making changes and keeping track of those change, often manually |
|
Definition
|
|