• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/24

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

24 Cards in this Set

  • Front
  • Back

Unauthorized access or use of sensitive data is known as what?

Data breach

A thorough examination of each aspect of a network to determine how it might be compromised is known as what?

Posture Assessment

Someone who masters the inner workings of software/hardware to better understand how it works is known as what?

Hacker

A general term used to describe someone who gains unauthorized access to systems or networks is known as what?

Hacker



A weakness of a system, process, or architecture that could lead to compromised information or unauthorized access is known as what? The act of taking advantage this weakness is known as what?

Vulnerability; exploit

The act of taking advantage of a software vulnerability before anyone knows about it is called what?

Zero-day exploit or zero-day attack

A practice in which a person attempts to extract authentication information or access by posing as someone else.

Phishing

The maximum size of an ICMP packet is

65,535 bytes

Characteristics of Malware are

Encryption, Stealth, Polymorphism

Software that enable a computer to act as a packet-filtering firewall include...

iptables (linux systems)


ZoneAlarm


Comodo Firewall

A system that is capable of collecting and analyzing information generated by firewalls, IDS, and IPS systems is known as what?

SIEM (Security Information and Event Management)

A comparison of a file's content with known malware that requires the database to be frequently updated to remain effective.

Signature Scanning

Programs that run independently and travel between computers and travel across networks.

Worms

_________ _______ detects malware by comparing current characteristics of files and disks against an archived version of these characteristics to discover any changes

Integrity checking

Two types of agents that are used to check compliance with network security policies are known as what?

Persistent agent; dissolvable agent

A type of IDS (intrusion detection system) that runs on a single computer to alert about attacks to that one host is know as what?

HIDS (host-based intrusion detection system)

A type of IDS (intrusion detection system) that protect a netowrk and is usually situated at the edge of the network or in the DMZ is known as what?

NID (network-based intrusion detection system)

A firewall might be installed in a _____ _____ _____, meaning the firewall is transparent to surrounding nodes as if it's just part of the wire.

virtual wire mode

In ACL statements, any is equivalent to using a wildcard make of ___________ witch allows all IP addresses to pass through.

0.0.0.0

What type attack allows hackers to transmit bogus requests (or sometimes, successful requests) for connection to servers or applications in order to harvest useful information to guide there attack efforts?

banner-grabbing attack

What must be frequently updated so that the software can detect new viruses a they emerge?

Signature scanning

A reflective attack can be amplified when conducted in conjunction with what type of attack?

amplification attack

A specification created by the NSA to define protection again radio frequency emanation.

TEMPEST

The implementation of TEMPEST that defines protection standards against RF emanation.

EmSec (Emission Security)