Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
20 Cards in this Set
- Front
- Back
The single most common method used to penetrate network defenses and steal information that a company has is _________________________. |
Social Engineering |
|
_____________________ is a method used to steal passwords and account information that commonly involves e-mails and bogus web sites. |
Phishing |
|
A form of malware that is used to steal personal information and web surfing habits is called ___________________________________. |
Spyware |
|
A ___________________ is a form of malware that changes already existing files in an attempt to cause harm to a computer. |
virus |
|
A ________________________ is a form of malware that conceals itself as a legitimate program it has replaced. |
trojan |
|
A form of malware that attempts to sneak itself onto a computer without being noticed and then executing itself without trying to replace a legitimate program is called a _________________. |
worm |
|
When a hacker tries to overload a system by flooding it with irrelevant network traffic, the hacker has launched a _____________________ attack. |
Denial of Service (DoS) |
|
A _______________________ is a wireless access point that does not belong on a network. |
rogue access point |
|
A piece of software that is designed to look for and detect network intrusions is called _______________________________________. |
intrusion detection software |
|
____________________ is an open authentication protocol that uses a three-way-handshake to authenticate a client to a server. |
Challenge-HandShake Authentication Protocol (CHAP) |
|
A secure protocol used to transport HTML pages across the Internet is ___________. |
HTTPS |
|
_________________ is a secure protocol used to manage devices on a network. |
SNMPv3 |
|
Which of the following does AAA stand for? A. Authentication, Authorization, Accounting B. Access, Authentication, Accounting C. Accounting, Access Control, Authorization
D. Access Control, Accounting Control, Authorization Control |
A. Authentication, Authorization, Accounting |
|
Which of the following are considered unsecure protocols? (Choose all that apply.) A. HTTP B. Telnet C. RSH
D. SFTP |
A.)HTTP B.)Telnet C.RSH |
|
_______________ is a form of encryption that requires each party to have the same key. |
Private key encryption |
|
A software program that is able to detect when a hacker intrudes into a network and is able to take steps to stop the attack is called what? |
Intrusion prevention software |
|
The authentication protocol most commonly used by Windows domain controllers to control access to their domains in a LAN environment is called what? |
Kerberos |
|
___________ is a proprietary authentication protocol that uses a three-way-handshake to allow access to a network. |
MS-CHAP |
|
____________ is a form of encryption generally used with wireless LANs. |
TKIP |
|
10. Which of the following are important functions of both RADIUS and TACACS+? (Choose all that apply.) A. Authentication B. Access Control C. Authorization D. Accounting |
A.Authentication C. Authorization D.Accounting |