Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
25 Cards in this Set
- Front
- Back
"A low-level software component included on a computer's motherborad in ready-only memory{ROM} form" The CPU runs BIOS code when it first start up, and the BIOS is responsible for locating and booting an OS or OS loader.
|
BIOS:
|
|
"Promgram that scans the computer for known "root kits"-intrustion software employed by script kiddies
|
chkrootkit:
|
|
"A modular printing system for Unix like computer oprating systems", allow a computer to act as a print server. A computer running this is a host that can accept print jobs from client computers, process them, and send them to the appropriate printer.
|
CUPS:
|
|
"A type of"attack "on a computer
or network that prevents use of a computer for its intended function", typically without actually breaking into the computer. These "attacks" frequently involve flooding a network or computer with useless data packets that overload the target's network bandwidth |
Denial-Of-Service Attack
|
|
"Display the contents of the kernel ring buffer"
|
dmesg:
|
|
"A process that scrambles data so that only the possessor or the correct key can desramble the data to read it"
|
Encryption:
|
|
"A program or kernel configuration that blocks access to specific ports or network programs on a computer" Also a computer that's configured as a router and that includes firewall software that can restrict access between the networks it manages.
|
Firewall:
|
|
"An application that allows you to encrypt and decrypt information, create public and private encryption keys, and use or verify digital signatures"
|
GPG
|
|
"A term that describes the acceptance of data from an external source or the sending of data to an external source"
|
I/O ports:
|
|
"A program that monitors network traffic for suspicious activity and alerts the appropriate administrator to warning signs
|
IDS:
|
|
"Utility to submit a print job to a printer
|
Ipr:
|
|
"The process of modifying network address information in datagram packet headers while in transit across a traffic routing device for the purpose of remapping a given address space into another"
|
NAT:
|
|
"General purpose network information tool may be used to check for open ports"
|
netstat:
|
|
"A network scanner that can scan for open ports on the computer or on other computers".0
|
nmap:
|
|
"The process of sending bogus e-mail or putting up fake Web sites with the goal of collecting sensitive personal information{ typically credit card numbers}.
|
Phishing
|
|
"Software designed to search a network host for open ports" This is often used by administrators to check the security of their networks and by crackers to compromiseit
|
Port Scanner
|
|
"Program that can block access to individual ports and report on activity directed at that port"
|
Portsentry
|
|
"The test of hardware performed at startup"
|
POST
|
|
"A type of ATA inferface that uses serial data tranfer rather than the parallel data transfer used in older form of ATA"
|
SATA
|
|
"An cable that can be used to transfer information between two devices using serial communication, often using the R-232 standard" They may use D-subminiature connectors with 9 to 25 pins, but other connectors are used
|
Serial cable
|
|
"An interface standard for hard disks,CD-ROM drives, tape drives, scanners, and other devices"
|
SCSI bus
|
|
"Program that provide intrustion detection features for a network
|
Snort
|
|
"The practice of convincing individuals to disclose sensitive information without arousing suspicious" Social engineers may pretend to be system admnistators to ask for passwords, for instance
|
Social engineering
|
|
"A host-based Networking ACL system" used to filter network access to Internet Protocol servers on Linux" It allows host or subnetwork IP address, name and/or ident query replies, to be used as tokens on which to filter for access control purpose
|
Tep wrapper
|
|
"Program that can monitor files for suspicious changes based on stored checksum value for the protected files
|
Tripwire
|