• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/25

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

25 Cards in this Set

  • Front
  • Back
One of two tupes of attacks. In the first tupe, a programmer adds a "back door" to allow them to access the code while it is runnig. The second type refers to gaining access to a network and inserting a program or utility that creates an entrance for the attacker.
Back Door Attack
An attempt to guess passwords until a successful guess occurs, usually over long periods.
Brute Force Attack
An impact printer that uses a plastic or metal print mechanism with a different character on the end of each spoke of the wheel. As the print mechanism rotates to the correct letter, a small hammer strikes the character against the ribbion transferring the image onto the paper.
Daisy Wheel Printer
An attackk that used a dictoionary of common words to attempt to find a user's passwords. This type of attack can be automated.
Dictionary Attack
A protocol and system for mapping IP addresses to user-friendly names. It resolves host names to IP addresses, and vice versa (with reverse lookups)
DNS
Enables the centeralized management of user desktops, and domain security, and the deployment and management of software throughout your network. These are created by an adminstrator that affects all users on a computer or all users in a domain, and are generally set by domain adminstrators on a domain level.
Group Policy
The process of reduciing or eliminating weakness, securing servies and attempting to make you environment immune to attacks.
Hardening
Small applications that are used to make repairs to a system during normal operation, even though they might require a reboot. It may entail moving data from a bad spot on the disk and remapping the data and remapping to a new sector.
HotFix
A secure form of HTTP used commonly for Internet business transactioins or any time where a secure connection is required
HTTPS
Any printer that forms an image on paper by forcing a character image against an inked ribbon. Dot-matrix, daisy-wheel, and line printers are all considered to be this type whereas laser printers are not.
Impact Printer
The command-line based Windows NT utility used to display the current TCP/IP configuration on the local computer and to modify the DCHP addresses assigned to each interface
IPConfig
Protocol that is primarily used by Novell NetWare networks, but which can be used by other networks (such as Micorsoft networks) as a routable protocap; pr tp cpmmect to Novell networks
IPX/SPX
The attack method whereby a piece of software is installed between a server and the user that neither the server administrators nor the user are aware of. the software intercepts sent user data and retransmits it to the server. The server will respond to the software, thinking it is the client. Usually, the softwae is recording all data sent
MAN-IN-THE-MIDDLE ATTACK
The command-line utilty that enables you to verify entries on a DNS server. It can be used in two modes: interactive, which allows miltiple request to the DNS server in a session; and non-interactive, where the the user specifies a single query to the DNS server
NSLOOKUP
Access restructuibs available on hard drives formatted with NTFS and which are effective both locally and over the network.
NTFS Permissions
A temporay quick fix to a program. these may be used to temporialy bypasss a set of instructions that have malfunctioned.
Patch
Term for a msall network message (ICMP ECHO) sent by a computer to check for presence and responsiveness of another. Also used to verify the presence if another system.
PING
The level of security that will be implemented and maintained in a network.
Security Baseline
A comprehensive set of fixes consolidated into a single product. It may be used to address alarge number of bugs or to introduce new capabilites in an OS
Service Pack
A printer that useds ink in a waxy solid form, rather than a liquid form. This allows te ink to stay fresh and eliminates problems like spillage.
Solid-Ink Printer
An attempt by somone or something to masquerade as someone else.
Spoofing Attack
Also called active sniffing, involes the attacker gaining access to a host in the network and logically disconnecting it form the network. The attacker then inserts another machine with the same IP Address. this happens quickly and gives the attacker access to the sessioin and to all the information of the orignal sessioin
TCP/IP Hijacking
A usite of Internet protcols upon which the internet is based. This is the default protocol for the Widnows family.
TCP/IP
The three-letters (usually extension on a FQDN that indentifies the type of domain being accessed. common extensions are: .com, .net, .mil, .gov,
Top-Level Domains
Command-line utility that enables you to verify the route a packet takes from a host computer to a remote host.
TRACERT