Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
25 Cards in this Set
- Front
- Back
BIOS
|
A low-level software component included on a computer's motherboard in read-only memory(ROM) form. The CPU runs BIOS code when it first starts up, and the BIOS is responsible for locating and booting an OS or OS loader
|
|
chkrootkit
|
Program that scans the computer for known root kits - intrusion software employed by script kiddies
|
|
CUPS
|
A modular printing system for Unix-like computer operating systems, allows a computer to act as a print server. A computer running this is a host that can accept print jobs from client computers, process them, and send them to the appropriate printer
|
|
Denial-Of-Service-Attack
|
A type of attack on a computer or network that prevents use of a computer for its intended function, typically without actually breaking into the computer. These attacks frequently involve flooding a network or computer with useless data packets that overload the target's network bandwidth
|
|
dmesg
|
Displays the contents of the kernel ring buffer
|
|
Encryption
|
A process that scrambles data so that only the possessor or the correct key can descramble it
|
|
Firewall
|
A program or kernel configuration that blocks access to specific ports or network programs on a computer. Also a computer that's configured as a router and that includes firewall software that can restrict access between the networks it manages
|
|
GPG
|
An application that allows you to encrypt and decrypt information, create public and private encryption keys, and use or verify digital signatures
|
|
I/O ports
|
A term that describes the acceptance of data from an external source or the sending of data to an external source
|
|
IDS
|
A program that monitors network traffic for suspicious activity and alerts the appropriate administrator to warning signs
|
|
Ipr
|
Utility to submit a print job to a printer
|
|
NAT
|
The process of modifying network address information in the datagram packet headers while in transit across a traffic routing device for the purpose of remapping a given address space into another
|
|
netstat
|
General purpose network information tool May be used to check for open ports
|
|
nmap
|
A network scanner that can scan for open ports on the local computer or on other computers
|
|
Phishing
|
The process of sending bogus e-mail or putting up fake web sites with the goal of collecting sensitive personal information(typically credit card numbers)
|
|
Port Scanner
|
Software designed to search a network host for open ports. This is often used by administrators to check the security of their networks and by crackers to compromise it
|
|
Portsentry
|
Program that can block access to individual ports and report on activity directed at that port
|
|
POST
|
The test of hardware performed at startup
|
|
SATA
|
A type of ATA interface that uses serial data transfer rather than parallel data transfers used in older forms of ATA
|
|
SCSI bus
|
An interface standard for standard disks, CD-ROM drives, tape drives, scanners, and other devices
|
|
Serial cable
|
A cable that can be used to tranfer information between two devices using serial communication, often using the RS-232 standard. They may use D-subminiature connectors with 9 or 25 pins, but other connectors are used.
|
|
Snort
|
Program that provides intrusion detection features for a network
|
|
Social Engineering
|
The practice of convincing individuals to disclose sensitive information without arousing suspicion. Social engineers may pretend to be system administrators to ask for password, for instance
|
|
Tcp wrapper
|
The host-based Networking ACL system, used to filter network access to Internet Protocol servers iin Linux. It allows host or subnetwork IP addresses, names, and /or ident querry replies, to be usedas tokens on which to filter for access control purposes.
|
|
Tripwire
|
Program that can monitor files for suspicious changes based on stored checksum values for the protected files
|