• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/25

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

25 Cards in this Set

  • Front
  • Back
One of two types of attacks. In the first type, a programmer adds a "back door" to allow them to access the code while it is running. The second type refers to gaining access to a network and inserting a program or utility that creates an entrance for the attacker.
Back Door Attack
An attempt to guess passwords until a successful guess occurs, usually over long periods.
Brute Force Attack
An impact printer that uses a plastic or metal print mechanism with a different character on the end of each spoke of the wheel. As the print mechanism rotates to the correct letter, a small hammer strikes the characters against the ribbon, transferring the image onto the paper.
Daisy Wheel Printer
An attack that uses a dictionary of common words to attempt to find a user's password. This type of attack can be automated.
Dictionary Attack
A protocol and system for mapping IP addresses to user-friendly names. It resolves host names to IP addresses, and vice versa (with reverse lookups).
DNS
Enables the centralized management of user desktop settings, desktop and domain security, and the deployment and management of software throughout your network. These are created by an administrator that affects all users on a computer or all users in a domain, and are generally set by domain administrators on a domain level.
Group Policy
The process of reducing or eliminating weaknesses, securing services, and attempting to make your environment immune to attacks.
Hardening
Small applications that are used to make repairs to a system during normal operation, even though they might require a reboot. It may entail moving data from a bad spot on the disk and remapping the data to the new sector.
Hotfix
A secure form of HTTP used commonly for Internet business transactions or any time where a secure connection is required.
HTTPS
Any printer that forms an image on paper by forcing a character image against an inked ribbon. Dot-matrix, daisy-wheel, and line printers are all considered to be this type, whereas laser printers are not.
Impact Printer
The command-line based Window NT utility used to display the current TCP/IP configuration on the local computer and to modify the DHCP addresses assigned to each interface.
IPCONFIG
Protocol that is primarily used by Novell NetWare networks, but which can be used by other networks (such as Microsoft networks) as a routable protocol or to connect to Novell networks.
IPX/SPX
The attack method whereby a piece of software is installed between a server and the user that neither the server administrators nor the user are aware of. The software intercepts sent user data and retransmits it to the server. The server will respond to the software, thinking it is the client. Usually, the software is recording all data sent.
Man-in-the-middle Attack
The command-line utility that enables you to verify entries on a DNS server. It can be used in two modes: interactive, which allows multiple requests to the DNS server in a session; and non-interactive, where the user specifies a single query to the DNS server.
NSLOOKUP
Access restrictions available on hard drives formatted with NTFS which are effective both locally and over the network.
NTFS Permissions
A temporary or quick fix to a program. These may be used to temporarily bypass a set of instructions that have malfunctioned.
Patch
Term for a small network message (ICMP ECHO) sent by a computer to check for the presence and responsiveness of another. Also used to verify the presence of another system.
PING
The level of security that will be implemented and maintained in a network.
Security Baseline
A comprehensive set of fixes consolidated into a single product. It may be used to address a large number of bugs or to introduce new capabilities in an OS.
Service Pack
A printer that uses ink in a waxy solid form, rather than in a liquid form. This allows the ink to stay fresh and eliminates problems like spillage.
Solid-Ink Printer
An attempt by someone or something to masquerade as someone else.
Spoofing Attack
Also called active sniffing, involves the attacker gaining access to a host in the network and logically disconnecting it from the network. The attacker the inserts another machine with the same IP Address. This happens quickly and give the attacker access to the session and to all the information of the original session.
TCP/IP Hijacking
A suite of Internet protocols upon which the Internet is bases. This is the default protocol for the Windows family.
TCP/IP
The three-letter (usually) extension on a FQDN that identifies the type of domain being accessed. Common extensions are: .com, .net, .mil, .gov,, etc.
Top-Level Domains
Command-line utility that enables you to verify the route a packet takes from a host computer to remote host.
TRACERT