• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/20

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

20 Cards in this Set

  • Front
  • Back

The single most common method used to penetrate network defenses and steal information that a company has is _________________________.


Social Engineering

_____________________ is a method used to steal passwords and account information that commonly involves e-mails and bogus web sites.


Phishing

A form of malware that is used to steal personal information and web surfing habits is called ___________________________________.


Spyware

A ___________________ is a form of malware that changes already existing files in an attempt to cause harm to a computer.


virus

A ________________________ is a form of malware that conceals itself as a legitimate program it has replaced.


trojan

A form of malware that attempts to sneak itself onto a computer without being noticed and then executing itself without trying to replace a legitimate program is called a _________________.


worm

When a hacker tries to overload a system by flooding it with irrelevant network traffic, the hacker has launched a _____________________ attack.


Denial of Service (DoS)

A _______________________ is a wireless access point that does not belong on a network.


rogue access point

A piece of software that is designed to look for and detect network intrusions is called _______________________________________.

intrusion detection software

____________________ is an open authentication protocol that uses a three-way-handshake to authenticate a client to a server.


Challenge-HandShake Authentication Protocol (CHAP)

A secure protocol used to transport HTML pages across the Internet is ___________.

HTTPS

_________________ is a secure protocol used to manage devices on a network.

SNMPv3

Which of the following does AAA stand for?


A. Authentication, Authorization, Accounting


B. Access, Authentication, Accounting


C. Accounting, Access Control, Authorization



D. Access Control, Accounting Control, Authorization Control

A. Authentication, Authorization, Accounting

Which of the following are considered unsecure protocols? (Choose all that apply.)


A. HTTP


B. Telnet


C. RSH



D. SFTP

A.)HTTP


B.)Telnet


C.RSH

_______________ is a form of encryption that requires each party to have the same key.

Private key encryption

A software program that is able to detect when a hacker intrudes into a network and is able to take steps to stop the attack is called what?

Intrusion prevention software

The authentication protocol most commonly used by Windows domain controllers to control access to their domains in a LAN environment is called what?

Kerberos

___________ is a proprietary authentication protocol that uses a three-way-handshake to allow access to a network.

MS-CHAP

____________ is a form of encryption generally used with wireless LANs.

TKIP

10. Which of the following are important functions of both RADIUS and TACACS+? (Choose all that apply.)


A. Authentication


B. Access Control


C. Authorization


D. Accounting

A.Authentication


C. Authorization


D.Accounting