Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
25 Cards in this Set
- Front
- Back
a low-level software component included on a computers motherboard in read-only memory (ROM) form. the CPU runs BOIS code when it first starts up, and the BIOS is responsible for locating and booting an OS or OS loader.
|
BIOS
|
|
program that scans the computer for known root kits - intrusion software employed by script kiddies.
|
chkrootkit
|
|
a modular printing system for Unix-like computer operating systems, allows a computer to act as a print server. A computer running that that is a host that can accept print jobs from client computers, process them m and sends them to the appropriate printer.
|
CUPS
|
|
a type of attack on a computer or network that prevents use of a computer for its intended function, typically without actually breaking into the computer. these attacks frequently involve flooding a network with useless data packets that overload the targets network bandwidth.
|
Denial-of-Service Attack
|
|
displays the contents of the kernel ring buffer.
|
dmesg
|
|
the process that scrambles data so that only the possessor of the correct key can descrambe the data to read it.
|
Encryption
|
|
a program or kernel configuration that blocks access to specific ports or network programs on a computer. Also a computer thats configured as a router and that included firewall software that can restrict access between the networks in manages.
|
Firewall
|
|
an application that allows you to encrypt and decrypt information, create public and private encryption keys, and use or verify digital signatures
|
GPG
|
|
a term that describes the acceptance of data from an external source or the sending of data to an external source.
|
I/O ports.
|
|
a program that monitors network traffic for suspicious activity and alerts the appropriate administrator to warning signs.
|
IDS
|
|
utility to submit a print job to a printer
|
Ipr
|
|
the process of modifying network address information in datagram packet headers while in transit across a traffif routing device for the purpose of remapping a given address space to another.
|
NAT
|
|
general purpose network information tool. May be used to check for open ports.
|
netstat
|
|
a network scanner that can scan for open ports on the local computer of on other computers.
|
nmap
|
|
the process of sending bogus e-mail or putting up fake web sites with the goal of collecting sensitive personal information (typically credit card numbers)
|
phishing
|
|
software designed to search a network host for open ports. This is often used by administrators to check the security of their networks and by crackers to compromise it.
|
port scanner
|
|
program that can block access to individual ports and report on activity directed at that port
|
portsentry
|
|
the test of hardware preformed at startup
|
POST
|
|
a type of ATA interface that uses serial data transfer rather that the parallel data transfers used in older forms of ATA
|
SATA
|
|
an interface standard for hard didks, CD-ROM drives, tape drives, scanners, and other devices.
|
SCSI bus
|
|
a cable that can be used to transfer information between two devices using serial communication, ofter using the RS-232 standard. They may use D-subminiature connectors with 9 or 25 pins, but other connectors are used.
|
Serial cabe
|
|
program that provides intrusion section features for a network.
|
snort
|
|
the practice of convincing individuals to disclose sensitive information without arousing suspicion. Social engineers may pretend to be system administrators to ask for passwords, for instance.
|
social engineering
|
|
a host based networking ACL system, used to filter network access to internet protocol servers on Linux. it allows host or subnetwork IP addresses, names and/or ident query replies, to be used as tokens on which to filter for access control purposes.
|
tep wrapper
|
|
program that can monitor files for suspicious changes based on stored checksum values for the protected files.
|
Tripwire
|