Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
25 Cards in this Set
- Front
- Back
One of 2 types of attacks. In the first type, a programmer adds a "back door" to allow them to access the code while it is running. Second type refers to gaining access to a network and inserting a program or utility that creates an entrance for the attacker
|
BACK DOOR ATTACK
|
|
An attempt to guess passwords until a successful guess occurs, usually over long periods
|
BRUTE FORCE ATTACK
|
|
An impact printer that uses a plastic or metal print mechanism with a diffreent character on the end of each spoke of the wheel. As the print mechanism rotates to the correct letter, a small hammer strikes the character against the ribbon, transferring the image onto the paper
|
DAISY WHEEL PRINTER
|
|
An attack that uses a dictionary of common words to attempt to find a user's password. This can be automated
|
DICTIONARY ATTACK
|
|
A protocol and system for mapping IP addresses to user-friendly names. It resolves host names to IP addresses and vice versa (with reverse lookups)
|
DNS
|
|
Enables the centralized management of user desktop settings, desktop and domain security, and the deployment and management of software throughout your network. These are created by an Admin that affects all users on a computer or all users in a domain, and are generally set by domain Admins on a domain level
|
GROUP POLICY
|
|
The process of reducing or eliminating weaknesses, securing services, and attempting to make your environment immune to attacks
|
HARDENING
|
|
Small applications that are used to make repairs to a system during normal operation, even though they might require a reboot. It may entail moving data from a bad spot on the disk and remapping the data to a new sector
|
HOTFIX
|
|
A secure form of HTTP used commonly for Internet business transactions or any time where a secure connection is required
|
HTTPS
|
|
Any printer that forms an image on paper by forcing a character image against an inked ribbon. Dot-matrix, daisy-wheel, and line printers are all considered to be this type, whereas laser printers are not
|
IMPACT PRINTER
|
|
The command-line based Windows NT utility used to display the current TCP/IP configuration on the local computer and to modify the DHCP addresses assigned to each interface
|
IPCONFIG
|
|
Protocol that is primarily used by Novell Netware networks, but which can be used by other networks (such as Microsoft networks) as a routable protocol or to connect to Novell networks
|
IPX/SPX
|
|
The attack method whereby a piece of software is installed between a server and user that neither Admins nor the user are aware of. The software intercepts sent user data and retransmits it to the server. The server will not respond to the software, thinking it is a client. Usually, the software is recording all data sent
|
MAN-IN-THE-MIDDLE ATTACK
|
|
The command-line utility that enables you to verify entries on a DNS server. It can be used in (2) modes: interactive, which allows multiple requests to the DNS server in a session; non-interactive, where the user specifies a single querry to the DNS server
|
NSLOOKUP
|
|
Access restrictions available on hard drives formatted with NTFS and which are effective both locally and over the network
|
NTFS PERMISSIONS
|
|
A temporary quick fix to a program. These may be used to temporarily bypass a set of instructions that have malfunctioned.
|
PATCH
|
|
Term for a small network message (ICMP ECHO) sent by a computer to check for the presence and responsiveness of another. Also used to verify the presence of another system
|
PING
|
|
The level of security that will be implemented and maintained in a network
|
SECURITY BASELINE
|
|
A comprehensive set of fixes consolidated into a single product. It may be used to address a large number of bugs or to introduce new capabilities in an OS
|
SERVICE PACK
|
|
A printer that uses ink in a waxy solid form, rather than a liquid form. This allows the ink to stay fresh and eliminates problems like spillage
|
SOLID-INK PRINTER
|
|
An attempt by someone or something to masquerade as someone else
|
SPOOFING ATTACK
|
|
Also called active sniffing, involves the attacker gaining access to a host in the network by logically disconnecting it from the network. The attacker then inserts another machine with the same IP address. This happens quickly and gives the attacker access to the session and to all the info of the original session
|
TCP/IP HIJACKING
|
|
A suite of internet protocols upon which the Internet is based. This is the default protocol for the Windows family
|
TCP/IP
|
|
The three-letter(usually) extension on a FQDN that identifies the type of domain being accessed. Common extensions are: .com, .net, .mil, .gov, etc.
|
TOP-LEVEL DOMAINS
|
|
Command-line utility that enables you to verify the route a packet takes from a host computer to a remote host
|
TRACERT
|