Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
51 Cards in this Set
- Front
- Back
3DES
|
Triple Digital Encryption Standard
|
|
ACL
|
Access Control List
|
|
AES
|
Advanced Encryption Standard
|
|
AES256
|
Advanced Encryption Standards 256bit
|
|
AH
|
Authentication Header
|
|
ALE
|
Annualized Loss Expectancy
|
|
ARO
|
Annualized Rate of Occurrence
|
|
ARP
|
Address Resolution Protocol
|
|
AUP
|
Acceptable Use Policy
|
|
BIOS
|
Basic Input/Output System
|
|
BOTS
|
Network Robots
|
|
CA
|
Certificate Authority
|
|
CAN
|
Controller Area Network
|
|
CCTV
|
Closed Circuit Television
|
|
CHAP
|
Challenge Handshake Authentication Protocol
|
|
CRL
|
Certification Revocation List
|
|
DAC
|
Discretionary Access List
|
|
DDOS
|
Distributed Denial of Service
|
|
DES
|
Digital Encryption Standard
|
|
DHCP
|
Dynamic Host Configuration Protocol
|
|
DLL
|
Dynamic Link Library
|
|
DMZ
|
Demilitarized Zone
|
|
DNS
|
Domain Name Service
|
|
DOS
|
Denial of Service
|
|
EAP
|
Extensible Authentication Protocol
|
|
ECC
|
Elliptic Curve Cryptography
|
|
FTP
|
File Transfer Protocol
|
|
GRE
|
Generic Routing Encapsulation
|
|
HIDS
|
Host Based Intrusion Detection System
|
|
HIPS
|
Host Based Intrusion Prevention System
|
|
HTTP
|
Hypertext Transfer Protocol
|
|
HTTPS
|
Hypertext Transfer Protocol over SSL
|
|
ICMP
|
Internet Control Message Protocol
|
|
IMAP4
|
Internet Message Acess Protocol v4
|
|
IP
|
Internet Protocol
|
|
What type of security would be primarily concerned with someone stealing the server from the premises?
|
physical security
|
|
What access method should you recommend if the method is to be one that is primarily based on preestablished access and can't be changed by users?
|
mandatory access control (MAC)
|
|
Your office administrator is being trained to perform server backups. What authentication method would be ideal for this situation?
|
role based access control (RBAC)
|
|
What method of authentication uses KDC to accomplish authentication for users, programs, or systems?
|
kerberos
|
|
What authentication method sends a challenge to the client that is encrypted and then sent back to the server?
|
challenge handshake authentication protocol (CHAP)
|
|
What authentication method uses more than one authentication process for a logon?
|
multi-factor
|
|
What service or protocol should be avoided in a network if possible in order to increase security?
|
telnet
|
|
What protocol allows an organization to present a single TCP/IP address to the internet while utilizing private IP addressing across the LAN?
|
network address translation (NAT)
|
|
What is a popular method for breaking a network into smaller private networks that can coexist on the same wiring and yet be unaware of each other?
|
virtual local area network (VLAN)
|
|
What service would most likely utilize a retinal scan?
|
authentication
|
|
what technology relies on a physical attribute of the user for authentication?
|
biometrics
|
|
what technology allows a connection to be made between two networks using a secure protocol?
|
tunneling
|
|
The process of determining the value of information or equipment in an organization is referred to as what?
|
asset identification
|
|
you have been asked to address a management meeting and present types of threats your organization could face from hackers. What would best categorize this type of information?
|
threat assessment
|
|
what is the process of determining who owns a particular database file?
|
accountability
|
|
A user just complained to you that his system has been infected with a new virus. What would be the first step to take in addressing and correcting this problem?
|
verify that the user's antivirus software is the most current version. this includes checking the virus definition files.
|