• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off

Card Range To Study



Play button


Play button




Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

34 Cards in this Set

  • Front
  • Back
Access list
a record or list of individuals who have permission to enter a secure area, the time that they entered and the time they left the area
access log
A log that can provide details regarding request for specif files on a system
Software that helps prevent computers from becoming infected by different types of spyware
Software that can examine a computer for any infections as well as monitor computer activities and scan new documents that might contain a virus.
audit log
A log that can track user authentication attempts
audit records:
Logs that are the second common type of security-related operating system logs
Bayesian filtering:
Spam filtering software that analyzes the contents of every word in an email and determines how frequently a word occurs in order to determine if it is spam.
cable lock
a device that can be inserted into the security slot of a portable device and rotated so that the cable lock is secured to the device to prevent it from being stolen.
closed-circuit television(cctv):
Using video cameras to transmit a signal to a specific and limited set of receivers used for surveillance in areas that require security monitoring.
cross-site request forgery(xsrf)
an attack that uses the users web browser settings to impersonate the user.
data loss prevention (DLP):
A system that can identify critical data, monitor how it is being accessed and protect it from unauthorized users.
deadbolt lock:
A door lock that extends a solid metal bar into the door frame for extra security
Faults in a program that occur while the application is running.
event logs:
logs that can document any unsuccessful events and the most significant successful events.
Securing a restricted area by erecting a barrier
Firewall (packet fileter)
Hardware or software that is designed to prevent malicious packets from entering or leaving computers.
fuzz testing (fuzzing):
A software testing technique that deliberately provides invalid, unexpected, or random data as inputs to a computer program.
GPS tracking:
Using the Global Positioning System (GPS) to detect the location of a portable device.
heuristic detection:
Creating a virtualized environment to simulate the central processing unit (CPU) and memory of the computer to check for the presence of a virus.
host-based software firewall:
A firewall that runs as a program on a local system to protect it against attacks.
Software that addresses a specific customer situation and often may not be distributed outside the customers organization.
input validation:
Verifying a user's input to an application
locking cabinet:
A secure storage unit that can be used for storing portable devices.
A record of events that occur.
A device that monitors and controls two interlocking doors to a small room( a verstible), designed go separate secure and nonsecure areas.
A general software security update intended to cover vulnerabilities that have been discovered.
pop-up blocker
Either a program or a feature incorporated within a browser that stops pop-up advertisements from appearing.
proximity reader:
A device that detects an emittedd ordto identify the owner.
remote wipe/Sanitation:
A technology that can remotely erase data from a portable device and reset it to its default settings
a rugged steal box with a lock
securuty logs
Logs that are considered the primary source of long data.
service pack:
Software that is a cumulative package of all security updates plus additional features
signature file:
A sequence of bytes( a string) found in the virus as a virus signature
voice encryption:
Using encryption to mask the content of voice communications