• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/28

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

28 Cards in this Set

  • Front
  • Back
what is RAS
remote access service unsured outdated microsoft service
What is PPP
dial up service to TCP/IP the most common dial up networking protocol today
what is PPTP
Point to point tunneling
how does PPTP work
A tunneling protocal that encapsulates connection oriented PPP packets into connectionless IP packets prevents sniffing and other outside manipulation
where is PPTP used
sets up private virtual networks
What is L2TP
layer 2 Tunneling Protocol that uses IP SEC to encrypt data from client to server
where is SSL employed
over HTTP FTP and application layer protocols to provide security
where is HTTPS used HTTP over SSL
Credit card validation companies and banks (LOCK ICON)
which remote access protocal would allow you to connect remotley through VPN
PPTP
A user cannot access a website because a protocol is not enabled what is the protocol
HTTP over SSL
what is the most reliable and secure remote access
L2TP
what type of audit prevents privilege creep
Privilege audit
what kind of physical access device restricts access to a small number of individuals at a time
Mantrap
what is PKCS
PUblic Key Cryptography standards voluntary standards for public key cryptography
what protocal creates a secure environemnt in a wireless network
WEP
A internet server interfaces with TCP Ip at which layer
process layer
in the key recovery process which key must be recoverable
previous key
which component of IDS collects data
Sensor
which mechanism is used by PKI to allow immediate verification of certificates validity
OCSP
which mechanism can enable or disable access to a network resource based on an IP address
ACL
what can increase security to a internet web server
Changing port address to 1019
what type of program exist to proagate itself to other systems
a worm
what is a major security problem with FTP servers
user ID and passwords are unecrypted
what system would you install to provide notification of security problems in a network connected to the internet
IDS
what encryption process uses one message to hide another
STeganography
which algorithm is used to create a temporary secure session for exchange of key info
KEA
what security standard is for handheld devices using asymmetric encryption
ECC
which back up method provides the fastest backup times
incremental backup