Term
|
Definition
What proves that a user or system is actually how they say they are? |
|
|
Term
|
Definition
Name 2 unique identifiers for a logon process. |
|
|
Term
Password Authentication Protocol (PAP) |
|
Definition
One of the simplest forms of authentication, the username and password values are both sent to the server as clear text and checked for a match. |
|
|
Term
Challenge Handshake Authentication Protocol (CHAP) |
|
Definition
What protocol challenges a system to verify identity? |
|
|
Term
|
Definition
Doesn't use a user ID/Password mechanism, instead, the initiator sends a logon request from the client to the server. The server sends a challenge back to the client. The challenge is encrypted and then sent back to the server. The server compares the value from the client and, if the information matches, grants authorization. |
|
|
Term
|
Definition
What can be stored on physical access devices such as smart cards or stored on the users computer as a digital signature used as part of the logon process. |
|
|
Term
Certificate Practice Statement(CPS) |
|
Definition
What outlines the rules for issuing and managing certificates? |
|
|
Term
Certificate Revocation List(CRL) |
|
Definition
Lists the revocations that must be addressed (often due to expiration) in order to stay current. |
|
|
Term
|
Definition
They contain the rights and access privileges of the token bearer as part of the token. |
|
|
Term
|
Definition
An authentication protocol named after the mythical three-headed dog that stood at the gates of Hades. |
|
|
Term
|
Definition
When two or more access methods are included as part of the authentication process, you're implementing a _______ system. |
|
|
Term
Two-factor authentication |
|
Definition
A system that uses smart cards and passwords is referred to as a __________ system. |
|
|
Term
|
Definition
When computer systems are retired, the disk drives should be zeroed out, and all magnetic media should be what? |
|
|
Term
|
Definition
Degaussing involves applying a strong magnetic field to initialize the media. This is also refered to as what? |
|
|
Term
|
Definition
A type of card that gives you access to resources including buildings, parking lots, and computers. It contains information about your identity and access privileges. |
|
|
Term
|
Definition
________ devices use physical characteristics to identify the user. |
|
|
Term
|
Definition
These are security devices that you carry with you that display a randomly generated code that you can then use for authentication. |
|
|
Term
|
Definition
Refers to attacks launched against applications and higher-level services. They include gaining access to data using weaknesses in the data-access objects of a database or a flaw in a service. |
|
|
Term
Database Exploitation
Application Exploitation
E-mail Exploitation |
|
Definition
3 Types pf exploitations that can be introduced using viruses. |
|
|
Term
.SCR files (screensavers) |
|
Definition
Viruses are often distributed through the use of these files? |
|
|
Term
|
Definition
________ are software programs that have the ability to hide certain things from the operating system. |
|
|
Term
|
Definition
A ______ is a piece of software designed to infect a computer system. |
|
|
Term
Contaminated floppy, cd, memory card
Email
As part of another program |
|
Definition
Viruses get into your computer in one of three ways. What are they? |
|
|
Term
|
Definition
________ are programs that enter a system or network under the guise of another program. May be included as an attachment or as part of an installation program. |
|
|
Term
|
Definition
What can reproduce itself, is self-contained, and doesn't need a host application to be transported.? |
|
|
Term
|
Definition
Any unwanted, and unsolicited e-mail |
|
|
Term
|
Definition
A term used to describe any application that is annoying or negatively affecting the performance of your computer |
|
|
Term
|
Definition
One of the first lines of defense in a network. |
|
|
Term
Share-level and User-level access privileges |
|
Definition
FAT allows only two types of protection, what are they? |
|
|
Term
|
Definition
Can track security in Access Control Lists (ACL) |
|
|
Term
Access Control List (ACL) |
|
Definition
Each entry in the _______ can also specify what type of access is given. |
|
|
Term
|
Definition
A drive encryption feature that can encrypt an entire volume with 128-bit encryption. |
|
|
Term
|
Definition
One of the newest security features available only in the Enterprise and Ultimate versions of Windows Vista. |
|
|
Term
Service-Set Identifiers (SSIDs) |
|
Definition
Wireless controllers use ________ that must be configured in the network cards to allow communications with a specific access point. |
|
|
Term
Wireless Transport Layer Security(WTLS) |
|
Definition
The security layer for WAP (Wireless Applications Protocol) |
|
|
Term
|
Definition
Provides the functional equivalent of TCP/IP for wireless devices. |
|
|
Term
Direct-sequence spread spectrum (DSSS) |
|
Definition
Accomplishes communication by adding the data that is to be transmitted to a higher-speed transmission. |
|
|
Term
Frequency-hopping spread spectrum (FHSS) |
|
Definition
Accomplishes communication by hopping the transmission over a range of predefined frequencies. |
|
|
Term
Orthogonal frequency division multiplexing (OFDM) |
|
Definition
Accomplishes communication by breaking the data into subsignals and transmitting them simultaneously. |
|
|
Term
Wireless Markup Language (WML) |
|
Definition
WAP uses a smaller version of HTML called _______ , which is used for internet displays. |
|
|
Term
|
Definition
When used by an attacker, a ______ can determine what types of systems are in use, the protocols used, and other critical information about your network. |
|
|
Term
|
Definition
The first layer of access control is always what? |
|
|
Term
|
Definition
______ are used to encode a message from its unencrypted or clear-text state into an encrypted message. |
|
|
Term
Hashing, Symmetric, and Asymmetric |
|
Definition
The three primary methods of encoding a message are? |
|
|
Term
Secure Hash Algorithm (SHA)
Message Digest Algorithm (MDA) |
|
Definition
The 2 primary standards that use the hashing process for encryption are? |
|
|
Term
|
Definition
Which algorithm was designed to ensure the integrity of a message and produces a 160-bit hash value? |
|
|
Term
|
Definition
The message digest algorithm (MDA) also creates a hash value and uses a one-way hash. There are several versions of MD, what are the most common? |
|
|
Term
|
Definition
_______ require both ends of an encrypted message to have the same key and processing algorithms. |
|
|
Term
|
Definition
_____ use 2 keys to encrypt and decrypt data. These keys are referred to as the public key and the private key. |
|
|
Term
|
Definition
Any attempt to violate a security policy, a successful penetration, a compromise of a system, or any unauthorized access to information. |
|
|
Term
Incident Response Policies |
|
Definition
______ define how an organization will respond to an incident. |
|
|
Term
|
Definition
________ is a process in which an attacker attempts to acquire information about your network and system by social means, such as talking to people in the organization. |
|
|
Term
|
Definition
______ is only needed when the user attempts to access the setup program. |
|
|
Term
|
Definition
____ is the name assigned to a chip that can store cryptographic keys, passwords, or certificates. |
|
|
Term
|
Definition
_______ defines the methods used to ensure that users of your network can access only what they're authorized to access. |
|
|
Term
|
Definition
________ is typically the name given to removing all usable data from media. |
|
|