• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/25

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

25 Cards in this Set

  • Front
  • Back
"A low-level software component included on a computer's motherborad in ready-only memory{ROM} form" The CPU runs BIOS code when it first start up, and the BIOS is responsible for locating and booting an OS or OS loader.
BIOS:
"Promgram that scans the computer for known "root kits"-intrustion software employed by script kiddies
chkrootkit:
"A modular printing system for Unix like computer oprating systems", allow a computer to act as a print server. A computer running this is a host that can accept print jobs from client computers, process them, and send them to the appropriate printer.
CUPS:
"A type of"attack "on a computer
or network that prevents use of a computer for its intended function", typically without actually breaking into the computer. These "attacks" frequently involve flooding a network or computer with useless data packets that overload the target's network bandwidth
Denial-Of-Service Attack
"Display the contents of the kernel ring buffer"
dmesg:
"A process that scrambles data so that only the possessor or the correct key can desramble the data to read it"
Encryption:
"A program or kernel configuration that blocks access to specific ports or network programs on a computer" Also a computer that's configured as a router and that includes firewall software that can restrict access between the networks it manages.
Firewall:
"An application that allows you to encrypt and decrypt information, create public and private encryption keys, and use or verify digital signatures"
GPG
"A term that describes the acceptance of data from an external source or the sending of data to an external source"
I/O ports:
"A program that monitors network traffic for suspicious activity and alerts the appropriate administrator to warning signs
IDS:
"Utility to submit a print job to a printer
Ipr:
"The process of modifying network address information in datagram packet headers while in transit across a traffic routing device for the purpose of remapping a given address space into another"
NAT:
"General purpose network information tool may be used to check for open ports"
netstat:
"A network scanner that can scan for open ports on the computer or on other computers".0
nmap:
"The process of sending bogus e-mail or putting up fake Web sites with the goal of collecting sensitive personal information{ typically credit card numbers}.
Phishing
"Software designed to search a network host for open ports" This is often used by administrators to check the security of their networks and by crackers to compromiseit
Port Scanner
"Program that can block access to individual ports and report on activity directed at that port"
Portsentry
"The test of hardware performed at startup"
POST
"A type of ATA inferface that uses serial data tranfer rather than the parallel data transfer used in older form of ATA"
SATA
"An cable that can be used to transfer information between two devices using serial communication, often using the R-232 standard" They may use D-subminiature connectors with 9 to 25 pins, but other connectors are used
Serial cable
"An interface standard for hard disks,CD-ROM drives, tape drives, scanners, and other devices"
SCSI bus
"Program that provide intrustion detection features for a network
Snort
"The practice of convincing individuals to disclose sensitive information without arousing suspicious" Social engineers may pretend to be system admnistators to ask for passwords, for instance
Social engineering
"A host-based Networking ACL system" used to filter network access to Internet Protocol servers on Linux" It allows host or subnetwork IP address, name and/or ident query replies, to be used as tokens on which to filter for access control purpose
Tep wrapper
"Program that can monitor files for suspicious changes based on stored checksum value for the protected files
Tripwire