Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
20 Cards in this Set
- Front
- Back
What is the term used to describe a hacker's attempt to discover unprotected modem connections to computer systems and networks called? |
War-dialing |
|
The activity where hackers wander throughout an area with a computer with wireless capability, searching for wireless networks they can access is referred to as which of the following? |
War-driving |
|
_____________ relies on lies and misrepresentation to trick an authorized user into providing information or access to an attacker. |
Social Engineering |
|
The term ___________ refers to software that has been designed for some nefarious purpose. |
Malware |
|
What is the process of assessing the state of an organization's security compared against an established standard called? |
Auditing |
|
Johnny received a "new version" of the game Solitaire in an e-mail. After running the program, a backdoor was installed on his computer without his knowledge. What kind of an attack is this? |
Trojan |
|
What is software that records and reports activities of the user (typically without their knowledge) called? |
Spyware |
|
Malicious code that sits dormant until a particular event occurs to release its payload is called what? |
Logic Bomb |
|
Authentication is the granting of specific permissions based on the privileges held by the account. |
False |
|
Authorization is the matching of user-supplied credentials to previously stored credentials on a host machine, and usually involves a username and password. |
False |
|
In a Kerberos environment, the first ticket in the two-step process is the ticket-granting ticket. |
True |
|
What protocol would you use for remote access, to get a console with an encrypted connection? |
SSH |
|
The three major components of the SSH protocol are the |
Transport Layer Protocol, User Authentication Protocol, and Connection Protocol |
|
Which protocol enables the secure transfer of data from a remote PC to a server by creating a VPN across a TCP/IP network? |
PPTP |
|
Which of the following describes the wireless standard? |
802.11 |
|
In addition to "What users know," "What users have," and "What users are," what did the author add to be able to authenticate a user? |
"What users do" |
|
With IPsec, AH and ESP |
can be used separately or together |
|
_______________ describes a process in which each side of an electronic communication verifies the authenticity of the other. |
Mutual authentication |
|
Mandatory access control: |
grants access permissions to objects based on the sensitivity of the information contained in the objects. |
|
_______________ is an authentication process by which the user can enter a single user ID and password then move from application to application or resource to resource without having to supply further authentication information. |
Single Sign-on |