Term
If you need information about the hardware installed what do you select
a) View general system information about the computer
b) View the status of my system hardware and software
c) Find information about the hardware installed on
this computer
d) View a list of Microsoft software installed on this
computer |
|
Definition
C.
Find information about the hardware installed on this
computer
Page 14 |
|
|
Term
The process of consolidating fragmented files and folder is called what? |
|
Definition
Defragmentation or defragging
page 27 |
|
|
Term
|
Definition
It is a system utilities that manages hard disk, Volumes, or the partations that they contain
page 27 |
|
|
Term
What does Windows Management instrumentation do? |
|
Definition
It permits viewing and changing system properties on a remote or local computer |
|
|
Term
What ensures that the information is correct and no unauthorized person or malicious software has altered the data?(Page 10) |
|
Definition
|
|
Term
What involves using someone's personal information such as a Social Security number,to establish bank or credit card accounts that are then left unpaid, leaving the victim with the debt and ruining their credit rating? (Page 13) |
|
Definition
|
|
Term
Targeted attacks against financial networks,unauthorized access to information, and the theft of personal information is sometimes known as what? (Page 18) |
|
Definition
|
|
Term
What is a software program that delivers advertising content in a manner that is unexpected and unwanted by the user? (Page 52) |
|
Definition
|
|
Term
What is a single, dedicated hard disk-based file storage device that provides centralized and consolited disk storage available to LAN (Local Area Network) users through a standard network connection? (Page 57) |
|
Definition
Network Attached Storage(NAS) |
|
|
Term
When an entire operating system environment is simulated, this is known as what? (Page 59) |
|
Definition
Operating system virtualization |
|
|
Term
When this technology enables a virtual machine to be moved to a different physical computer with no impact to the user-the virtual machine stores it current state onto a share storage device immediately before ___________ occurs. (Page 61) |
|
Definition
|
|
Term
Live migration can also be used for_____if the demand for a service or application increases then network managers can quickly move this high-demand virtual machine to another physical server with more RAM(Random Access Memory) or CPU (Central processing Unit) resources. (Page 61) |
|
Definition
|
|
Term
What is a Windows Vista and Windows XP Service Pack 2(SP2) feature that prevents attackers from using buffer overflow to execute malware? (Page 86) |
|
Definition
Data Execution Prevention (DEP) |
|
|
Term
What is configuration baseline?(Page 88) |
|
Definition
This is when the operating system configuration settings that will be used for each computer in the organization. |
|
|
Term
What is a computer programming language that is typically interpreted into a language the computer can understand? (Page 90) |
|
Definition
|
|
Term
What allows the administrator to configure the switch to redirect traffic that occurs on some or all ports to a designated monitoring port on the switch? (Page 121) |
|
Definition
|
|
Term
What makes a copy of the transmission before sending it to the recipient? (Page 131) |
|
Definition
|
|
Term
What is the most common protocol suite used today for networks as well as the Internet? (Page 131) |
|
Definition
Transmission Control Protocol/Internet Protocol(TCP/IP) |
|
|
Term
When TCP/IP was developed, the host table concept was expanded to a hierarchical name system known as the what? (Page 132) |
|
Definition
|
|
Term
What enables the attacker's computer to foward any network traffic it receives from Computer A to the actual router? (Page 136) |
|
Definition
|
|
Term
At regular intervals (normally every 100 microseconds) a wireless AP(access point) sends a _____ frame to annouce its presence and to provide the necessary information for devices that want to join the network what is this process? (Page 138) |
|
Definition
|
|
Term
When a group of piconets in which connections exists between different piconets is called what? (Page 140) |
|
Definition
|
|
Term
What is connected directly to the devices on the network? (Page 156) |
|
Definition
|
|
Term
What is used mainly by organizations to capture limited information regarding attacks on that organizations honey-pot? (Page 170) |
|
Definition
|
|
Term
What monitors Internet traffic and blocks access to preselected Web sites and files? (Page 174) |
|
Definition
Internet Content Filters(ICF) |
|
|
Term
What standard specifies a maximum speed of 54 Mbps using the 5GHz spectrum? (Page 192) |
|
Definition
|
|
Term
In 2002, the WECA organization changed its name to what? (Page 203) |
|
Definition
WI-FI Alliance (Wireless Fidelity) |
|
|
Term
Access points have a setting called_________ which is what the PSK (Preshared Key) uses as a seed value to generate new keys. (Page 203) |
|
Definition
|
|
Term
WPA(WI-FI Protected Access) replaces WEP(Wired Equivalent Privacy)with a encryption technology called what? (Page 203) |
|
Definition
Temporal Key Integrity Protocol(TKIP) |
|
|
Term
What allows a device to become authenticated to an AP(Access Point) before moving into range of the AP? (Page 207) |
|
Definition
|
|
Term
What are the duties of the custodian? (Page 228) |
|
Definition
He periodically reviews security settings and maintains records of access by end users. |
|
|
Term
The third access control model is considered a more "real world" approach than the other models what is this model called? (Page 232) |
|
Definition
Role Based Access Control (RBAC) |
|
|
Term
What practice requires that if the fraudulent application of a process could potentially result in a breach of security, then the process should be divided between two or more individuals? (Page 233) |
|
Definition
|
|
Term
What makes password attacks easier by creating a large pregenerated data set of hashes from nearly every possible password combination? (Page 240) |
|
Definition
|
|
Term
What kind of combination locks use buttons that must be pushed in the proper sequence to open the door? (Page 246) |
|
Definition
|
|
Term
What is a decentralized open source FIM(Federated Identity Management) that does not require specific software to be installed on the desktop? (Page 277) |
|
Definition
|
|
Term
The International Organization for Standardization (ISO) created a standard for directory services known as? (Page 381) |
|
Definition
|
|
Term
What takes a snapshot of the security of the organization as it nows stands? (Page 308) |
|
Definition
|
|
Term
What does open port mean? (Page 313) |
|
Definition
It means that the application or service assigned to that port is listening |
|
|
Term
What protocol provides support to IP in the form of ___________ messages that allow different types of communication to occur between IP devices? (Page 314) |
|
Definition
Internet Control Message Protocol (ICMP) |
|
|
Term
What is a genric term that refers to a range of products that looks for vulnerabilities in networks or systems? (Page 317) |
|
Definition
|
|
Term
What is it when permission given to a higher level "parent" will also be _______ by a lower level "child"? (Page 339) |
|
Definition
|
|
Term
What is designed for detecting statistical anomalies? (Page 348) |
|
Definition
|
|
Term
What is a process for creating a unique "signature" for a set of data? (Page 371) |
|
Definition
Hashing also called one-way hashing |
|
|
Term
What is the simplest type of stream cipher? (Page 376) |
|
Definition
|
|
Term
What is a block cipher that processes blocks of 64 bits? (Page 381) |
|
Definition
|
|
Term
Who patented the asymmetric algorithm RSA that was published in 1977 and when was it patented? (Page 385) |
|
Definition
|
|
Term
What chip is on the motherboard of the computer that provides crytographic services? (Page 388) |
|
Definition
Trusted Platform Module (TPM) |
|
|
Term
When bob sends one digital certificate to alice along with his message what is that known as? (Page 406) |
|
Definition
|
|
Term
What sprays the area with pressurized water? (Page 443) |
|
Definition
|
|
Term
A system of hard drives based on redundancy can be achieved through using a technology known as _______ which uses multiple hard disk drives for increased reliability and performance? (Page 448) |
|
Definition
Redundant Array of Independent Drives(RAID) |
|
|