• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/27

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

27 Cards in this Set

  • Front
  • Back
A low -level software component included on a computer's motherboard in read -only memory (ROM)form.The CPU runs BIOS code when it first starts up, and the BIOS is responsible for locating and booting an OS or OS loader.
BIOS:
Program that scans the computer for known root kits - intrustion software employed by script kiddies.
chkrootkit:
A modular printing system for Unix-like computer d poerating systems , allows a computer to act as a print server. A computer running this is a host that can accept print jobs from client computers, process them, and send them to the appropriate printer.
CUPS:
A type of attack on a computer or network that prevents use of a computer for its intended function, typically without actually breaking into the computer .These attacks frequently involve flooding a network or computer with use of a computer for its intended function, typically without actually breaking into the computer . These attacls frequentoy involve flooding a network or computer with useless data packets that overload the target's network bandwidth.
Denial -Of -Service Attact:
Displays the contents of the kernel ring buffer.
dmesg:
A process that scrambles data so that only the possessor or the correct key can descramble the data to read it.
Encryption:
A program or kernel configutation that blocks access to specific ports or network programs on a computer that's configured as a pouter and that includes firewall software that can restrict access between the networks it manges.
Firewall:
An application that allows you to encrypt information , create public and private encryption keys, and use or verify digital signatures.
GPG :
A term that describes the acceptance of data from an external source or the sending of data to an external source .
I/O ports:
A program that monitors network traffic for suspicious activity and alerts the appropriate administrator to warning signs.
IDS:
Utility to submit a print job to a printer
lpr:
The process of modifying network address information in datagram packet headers while in transit across a traffic routing device for the purpose of remapping a given address space into anther .
Nat:
General purpose network information tool May be used to check for open ports .
netstat:
A network scanner that can scan for open ports on the local computer or on other computer.
nmap:
The process of sending bogus e -mail or putting up fake Web sites with the goal of collecting sensitive personal information (typically credit card numbers.)
Phishing:
Software designed to search a network hast for open ports. This is often used by administrators to check the security of their networks and by crackers to compromise it.
Port Scanner:
Program that can block access to individual ports and report on activity directed at that port.
Portsentry:
The test of hardware performed at startup .
POST:
A type of ATA interface that uses serial data transfer rather than the parallel data transfers use in older forms ATA .
SATA:
An interface standard for hard disks, CD -ROM drives , tape may use drives ,scanners, and other devices,
SCSI bus;
A cable that can be used to transfer information between two devices using serial communication , often using the RS-232 standard .They may use D-subminiature connectors with 9 or 25 pins, but other connectors are used.
Serial cable:
Program that provides intrusion detection features for a network.
Snort:
The practice of convincing individuals to disclose sensitive information without arousing suspicion . Social engineers may use D-subminiature connectors with 9 or 25 pins,but other connectors are used.
Serial Cable:
Program that provides intrusion detection features for a network.
Snort:
The practice of convincing individuals to disclose sensitive information without arousing suspicion. Social engineers may pretend to be system administrators to ask for passwords, for instance.
Social engineering:
A host -based Networking ACL system, used to filter network access to Internet Protocol servers on Linux .It allows host or subnetwork IP addresses,names and /or ident query replies ,to be used as tokens on which to filter for access control purposes.
Tcp wrapper:
Program that can monitor files for suspicious changes based on stored checksum values for the protected files.
Tripwire: