• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/20

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

20 Cards in this Set

  • Front
  • Back

What is the term used to describe a hacker's attempt to discover unprotected modem connections to computer systems and networks called?

War-dialing

The activity where hackers wander throughout an area with a computer with wireless capability, searching for wireless networks they can access is referred to as which of the following?

War-driving

_____________ relies on lies and misrepresentation to trick an authorized user into providing information or access to an attacker.

Social Engineering

The term ___________ refers to software that has been designed for some nefarious purpose.

Malware

What is the process of assessing the state of an organization's security compared against an established standard called?

Auditing

Johnny received a "new version" of the game Solitaire in an e-mail. After running the program, a backdoor was installed on his computer without his knowledge. What kind of an attack is this?

Trojan

What is software that records and reports activities of the user (typically without their knowledge) called?

Spyware

Malicious code that sits dormant until a particular event occurs to release its payload is called what?

Logic Bomb

Authentication is the granting of specific permissions based on the privileges held by the account.

False

Authorization is the matching of user-supplied credentials to previously stored credentials on a host machine, and usually involves a username and password.

False

In a Kerberos environment, the first ticket in the two-step process is the ticket-granting ticket.

True

What protocol would you use for remote access, to get a console with an encrypted connection?

SSH

The three major components of the SSH protocol are the

Transport Layer Protocol, User Authentication Protocol, and Connection Protocol

Which protocol enables the secure transfer of data from a remote PC to a server by creating a VPN across a TCP/IP network?

PPTP

Which of the following describes the wireless standard?

802.11

In addition to "What users know," "What users have," and "What users are," what did the author add to be able to authenticate a user?

"What users do"

With IPsec, AH and ESP

can be used separately or together

_______________ describes a process in which each side of an electronic communication verifies the authenticity of the other.

Mutual authentication

Mandatory access control:

grants access permissions to objects based on the sensitivity of the information contained in the objects.

_______________ is an authentication process by which the user can enter a single user ID and password then move from application to application or resource to resource without having to supply further authentication information.

Single Sign-on