• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/25

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

25 Cards in this Set

  • Front
  • Back
One of 2 types of attacks. In the first type, a programmer adds a "back door" to allow them to access the code while it is running. Second type refers to gaining access to a network and inserting a program or utility that creates an entrance for the attacker
BACK DOOR ATTACK
An attempt to guess passwords until a successful guess occurs, usually over long periods
BRUTE FORCE ATTACK
An impact printer that uses a plastic or metal print mechanism with a diffreent character on the end of each spoke of the wheel. As the print mechanism rotates to the correct letter, a small hammer strikes the character against the ribbon, transferring the image onto the paper
DAISY WHEEL PRINTER
An attack that uses a dictionary of common words to attempt to find a user's password. This can be automated
DICTIONARY ATTACK
A protocol and system for mapping IP addresses to user-friendly names. It resolves host names to IP addresses and vice versa (with reverse lookups)
DNS
Enables the centralized management of user desktop settings, desktop and domain security, and the deployment and management of software throughout your network. These are created by an Admin that affects all users on a computer or all users in a domain, and are generally set by domain Admins on a domain level
GROUP POLICY
The process of reducing or eliminating weaknesses, securing services, and attempting to make your environment immune to attacks
HARDENING
Small applications that are used to make repairs to a system during normal operation, even though they might require a reboot. It may entail moving data from a bad spot on the disk and remapping the data to a new sector
HOTFIX
A secure form of HTTP used commonly for Internet business transactions or any time where a secure connection is required
HTTPS
Any printer that forms an image on paper by forcing a character image against an inked ribbon. Dot-matrix, daisy-wheel, and line printers are all considered to be this type, whereas laser printers are not
IMPACT PRINTER
The command-line based Windows NT utility used to display the current TCP/IP configuration on the local computer and to modify the DHCP addresses assigned to each interface
IPCONFIG
Protocol that is primarily used by Novell Netware networks, but which can be used by other networks (such as Microsoft networks) as a routable protocol or to connect to Novell networks
IPX/SPX
The attack method whereby a piece of software is installed between a server and user that neither Admins nor the user are aware of. The software intercepts sent user data and retransmits it to the server. The server will not respond to the software, thinking it is a client. Usually, the software is recording all data sent
MAN-IN-THE-MIDDLE ATTACK
The command-line utility that enables you to verify entries on a DNS server. It can be used in (2) modes: interactive, which allows multiple requests to the DNS server in a session; non-interactive, where the user specifies a single querry to the DNS server
NSLOOKUP
Access restrictions available on hard drives formatted with NTFS and which are effective both locally and over the network
NTFS PERMISSIONS
A temporary quick fix to a program. These may be used to temporarily bypass a set of instructions that have malfunctioned.
PATCH
Term for a small network message (ICMP ECHO) sent by a computer to check for the presence and responsiveness of another. Also used to verify the presence of another system
PING
The level of security that will be implemented and maintained in a network
SECURITY BASELINE
A comprehensive set of fixes consolidated into a single product. It may be used to address a large number of bugs or to introduce new capabilities in an OS
SERVICE PACK
A printer that uses ink in a waxy solid form, rather than a liquid form. This allows the ink to stay fresh and eliminates problems like spillage
SOLID-INK PRINTER
An attempt by someone or something to masquerade as someone else
SPOOFING ATTACK
Also called active sniffing, involves the attacker gaining access to a host in the network by logically disconnecting it from the network. The attacker then inserts another machine with the same IP address. This happens quickly and gives the attacker access to the session and to all the info of the original session
TCP/IP HIJACKING
A suite of internet protocols upon which the Internet is based. This is the default protocol for the Windows family
TCP/IP
The three-letter(usually) extension on a FQDN that identifies the type of domain being accessed. Common extensions are: .com, .net, .mil, .gov, etc.
TOP-LEVEL DOMAINS
Command-line utility that enables you to verify the route a packet takes from a host computer to a remote host
TRACERT