Shared Flashcard Set

Details

Chapter 26 Practice
Chapter 26 Practice
22
Computer Networking
Not Applicable
03/03/2013

Additional Computer Networking Flashcards

 


 

Cards

Term
What is it called when a user accesses resources in an unauthorized way?
Definition
Unauthorized Access
Term
What should be backed up to protect the Registry and Security Settings?
Definition
System State Data
Term
What is called when you move data from one pc to another?
Definition
Migration
Term
You format a hard drive that had sensitive data on it. What will be left on the hard drive?
Definition
Remnants
Term
What is the process of using or manipulating people inside the networking environment to gain access to that network from the outside?
Definition
Social Engineering
Term
What is it called when a hacker goes through the garbage looking for information?
Definition
Dumpster Diving
Term
Physical security, authentication, the file system, users and groups, and security policies combine to make what?
Definition
Access Control
Term
How does a computer determine who can or should access it?
Definition
Authentication
Term
A user has a credit card - sized card used to prove her identity with a PIN. What is this card called?
Definition
Smart Card
Term
What could a computer use to determine a user's identity with the most authority?
Definition
Biometric Device
Term
Sally is a member of multiple groups. A file has been granted different permissions to the different groups What is Sally's effective permission?
Definition
Combined permissions of all groups.
Term
To lock done security settings on a single commuter in a workgroup, what would you use?
Definition
Local Security Settings
Term
What is a piece of malicious software that gets passed from computer to computer by attaching itself to a program.
Definition
Virus
Term
What is a software program that looks like one thing but doing something else?
Definition
Trojan
Term
What is a complete program that travels form machine to machine through computer networks and has the capability to cause malicious problems?
Definition
Worm
Term
Together, what are Viruses, Trojans, and Worms called?
Definition
Malware
Term
Antivirus programs can passively monitor your computers activity. In this mode, what are they called?
Definition
Virus Shields
Term
To make sure antivirus programs are useful as possible, what should be updated regularly?
Definition
Signatures
Term
What type of virus attempts to change its signature to prevent detection by antivirus programs?
Definition
Polymorph
Term
What type of program runs in the background on your PC, sending information about your browsing habits to the company that installed it on your system? What type of program isn't destructive by itself, but leaches bandwidth in networks?
Definition
Grayware
Term
Which authentication method sends passwords in clear text?
Definition
PAP
Term
What can be used to create entries in the Security log whenever a user logs on?
Definition
Success Logging
Supporting users have an ad free experience!