Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
24 Cards in this Set
- Front
- Back
Unauthorized access or use of sensitive data is known as what? |
Data breach |
|
A thorough examination of each aspect of a network to determine how it might be compromised is known as what? |
Posture Assessment |
|
Someone who masters the inner workings of software/hardware to better understand how it works is known as what? |
Hacker |
|
A general term used to describe someone who gains unauthorized access to systems or networks is known as what? |
Hacker |
|
A weakness of a system, process, or architecture that could lead to compromised information or unauthorized access is known as what? The act of taking advantage this weakness is known as what? |
Vulnerability; exploit |
|
The act of taking advantage of a software vulnerability before anyone knows about it is called what? |
Zero-day exploit or zero-day attack |
|
A practice in which a person attempts to extract authentication information or access by posing as someone else. |
Phishing |
|
The maximum size of an ICMP packet is |
65,535 bytes |
|
Characteristics of Malware are |
Encryption, Stealth, Polymorphism |
|
Software that enable a computer to act as a packet-filtering firewall include... |
iptables (linux systems) ZoneAlarm Comodo Firewall |
|
A system that is capable of collecting and analyzing information generated by firewalls, IDS, and IPS systems is known as what? |
SIEM (Security Information and Event Management) |
|
A comparison of a file's content with known malware that requires the database to be frequently updated to remain effective. |
Signature Scanning |
|
Programs that run independently and travel between computers and travel across networks. |
Worms |
|
_________ _______ detects malware by comparing current characteristics of files and disks against an archived version of these characteristics to discover any changes |
Integrity checking |
|
Two types of agents that are used to check compliance with network security policies are known as what? |
Persistent agent; dissolvable agent |
|
A type of IDS (intrusion detection system) that runs on a single computer to alert about attacks to that one host is know as what? |
HIDS (host-based intrusion detection system) |
|
A type of IDS (intrusion detection system) that protect a netowrk and is usually situated at the edge of the network or in the DMZ is known as what? |
NID (network-based intrusion detection system) |
|
A firewall might be installed in a _____ _____ _____, meaning the firewall is transparent to surrounding nodes as if it's just part of the wire. |
virtual wire mode |
|
In ACL statements, any is equivalent to using a wildcard make of ___________ witch allows all IP addresses to pass through. |
0.0.0.0 |
|
What type attack allows hackers to transmit bogus requests (or sometimes, successful requests) for connection to servers or applications in order to harvest useful information to guide there attack efforts? |
banner-grabbing attack |
|
What must be frequently updated so that the software can detect new viruses a they emerge? |
Signature scanning |
|
A reflective attack can be amplified when conducted in conjunction with what type of attack? |
amplification attack |
|
A specification created by the NSA to define protection again radio frequency emanation. |
TEMPEST |
|
The implementation of TEMPEST that defines protection standards against RF emanation. |
EmSec (Emission Security) |