• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/25

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

25 Cards in this Set

  • Front
  • Back
One of two types o fattacks. In th e first type , a programmer adds a "back door": to allow them to access the code while it is running , The second type refers to gaining access to a network and inserting a program or utility that creates an entrance for the attacker,
Back Door Attack:
An attempt tp guess Passwords until a successful guess occurs, usuallly over long periods.
Brute Force Attack:
An impact printer that sal print mechanism with a sifferent character on the end of each spoke of th e wheel . As the print mechanism rotates to the correct letter, a small hammer strikes the cjaracter against the ribbon, transferring the image onto the paper.
Daisy Wheel printer:
An attack that uses a dictonary of common works to attempt to find a user's passwords.This typu of attack can be automated.
Dictionary Attack:
A protocol and system for maping IP addresses to user-friendly names.it resolves hodt names to IP addresses , and vice versa (with reverse lookups).
DNS:
Enables the centralized management of user desktop settings , desktop and domain security , and the deployment and management of software throughout your network . These are created by an administrator that affects all users on a computer or all users in a domain, and are generally set by domain administrators on a domain level .
Group Policy:
The process of reducing or eliminating weakneses , securing services , and attempting to make your enviroment immune to attacks.
Hardening:
Small applications that are used to make repairs to a system duting normal operation, even thought they might require a reboot. It may entail moving datd from a bad spot on the disk and remapping the data to the new sector.
Hotfix:
A secure form of HTTP used commonly for Internet business transactions or any time where a secure connection is required.
HTTPS:
Any printer that forms an image on paper by forcing a character image against an inked ribbon. Dot-matrix, daisy-wheel, and line printers are all considered to be this type, whereas laseer printers are not.
Impact printer:
The command -line based Windows NT uktilitly used dto display the current TCP/IP cinfiguration on the local computer and to modify the DHCP addresses assigned to each interface.
IPConfig :
Protocol that is primarily used by novell netWare networks, But which can be used by other networks (such as Microsft networks) as a routable protocol or to connect to Novell networks.
IPX/SPX:
The attack method whereby a piece of software is installed between a server and the user that neither the server administrators not the user are aware of. The software intercepts sent user data and retransmits it to the server will respond to the software ,thinking it is the client. Usually ,the software is recording all data sent.
Man-inthe middle Attack:
The command -line utility that enables you to verify entries on a DNS server in . It can be used in two modes: interactive , which allows multiple requests to the DNS server in a session;and non- interactive, where the user specifies a single query to the DNS server.
NSLOOKUP:
Access restrictions available on hard drives formatted with NTFS and which are effective both locally and over the network .
NTFS Permissions:
A temporary or quick fix to a program,These may be used to temporarily byoass set of instrhctions that hace malfunctioned.
Patch:
Term for a small network message (ICMP ECHO)sent by a computer to check for the presence and responsiveness of another . Also use dto verify the presence o fanother system.
PING:
The level of security that will be implemented and maintained in a network .
Securilty Baseline:
A comprehensive set o ffixes consolidated into a dingle product. It may be used to address a large number of bugs or to introduce new capabilities in an OS:>
Service Pack :
A printer that uses ink in a waxy solid from , rather than in a liquid form.This allows the ink to stay fresh and eliminates problems like spillage
Solid -ink Printer:
An attempts by someone or something sto masquerade as someone else.
Spoofing Attack:
Also called active sniffing, invoves the attacker gaining access to a host in the network and logically disconnecting it from the network and logically disconnecting it from the network , The attacker then inserts another machine with the same IP address. this happens quickly and gives the attacker access to the session and to all the information of the original session .
TCP/IP Hijacking:
A suite of Internet protocols upon which sthe Internet is based, This in the default protocol for the Windows family.
TCP/IP:
The three -letter (usually) extension on a FQDN that identifies the type of domain being accessed, Common extensions are: .com,.net, .mil, .gov, etc,
Top -Level Domains :
command-line utility that enables you to verify the route a packet takes from a host computer to the remote host.
TRACERT: