• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/51

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

51 Cards in this Set

  • Front
  • Back
3DES
Triple Digital Encryption Standard
ACL
Access Control List
AES
Advanced Encryption Standard
AES256
Advanced Encryption Standards 256bit
AH
Authentication Header
ALE
Annualized Loss Expectancy
ARO
Annualized Rate of Occurrence
ARP
Address Resolution Protocol
AUP
Acceptable Use Policy
BIOS
Basic Input/Output System
BOTS
Network Robots
CA
Certificate Authority
CAN
Controller Area Network
CCTV
Closed Circuit Television
CHAP
Challenge Handshake Authentication Protocol
CRL
Certification Revocation List
DAC
Discretionary Access List
DDOS
Distributed Denial of Service
DES
Digital Encryption Standard
DHCP
Dynamic Host Configuration Protocol
DLL
Dynamic Link Library
DMZ
Demilitarized Zone
DNS
Domain Name Service
DOS
Denial of Service
EAP
Extensible Authentication Protocol
ECC
Elliptic Curve Cryptography
FTP
File Transfer Protocol
GRE
Generic Routing Encapsulation
HIDS
Host Based Intrusion Detection System
HIPS
Host Based Intrusion Prevention System
HTTP
Hypertext Transfer Protocol
HTTPS
Hypertext Transfer Protocol over SSL
ICMP
Internet Control Message Protocol
IMAP4
Internet Message Acess Protocol v4
IP
Internet Protocol
What type of security would be primarily concerned with someone stealing the server from the premises?
physical security
What access method should you recommend if the method is to be one that is primarily based on preestablished access and can't be changed by users?
mandatory access control (MAC)
Your office administrator is being trained to perform server backups. What authentication method would be ideal for this situation?
role based access control (RBAC)
What method of authentication uses KDC to accomplish authentication for users, programs, or systems?
kerberos
What authentication method sends a challenge to the client that is encrypted and then sent back to the server?
challenge handshake authentication protocol (CHAP)
What authentication method uses more than one authentication process for a logon?
multi-factor
What service or protocol should be avoided in a network if possible in order to increase security?
telnet
What protocol allows an organization to present a single TCP/IP address to the internet while utilizing private IP addressing across the LAN?
network address translation (NAT)
What is a popular method for breaking a network into smaller private networks that can coexist on the same wiring and yet be unaware of each other?
virtual local area network (VLAN)
What service would most likely utilize a retinal scan?
authentication
what technology relies on a physical attribute of the user for authentication?
biometrics
what technology allows a connection to be made between two networks using a secure protocol?
tunneling
The process of determining the value of information or equipment in an organization is referred to as what?
asset identification
you have been asked to address a management meeting and present types of threats your organization could face from hackers. What would best categorize this type of information?
threat assessment
what is the process of determining who owns a particular database file?
accountability
A user just complained to you that his system has been infected with a new virus. What would be the first step to take in addressing and correcting this problem?
verify that the user's antivirus software is the most current version. this includes checking the virus definition files.