Shared Flashcard Set

Details

Chapter 26 Crossword
Chapter 26 Crossword
37
Computer Networking
Not Applicable
03/01/2013

Additional Computer Networking Flashcards

 


 

Cards

Term
A _____ virus attempts to change its signature to prevent detection by antivirus programs, usually by continually scrambling a bit of useless code.
Definition
Polymorph
Term
Most _____ virus programs are boot sector viruses that use various methods to hide from antivirus software.
Definition
Stealth
Term
_____ is the act of trying to get people to give their usernames, passwords, or other security information by pretending to be someone else electronically.
Definition
Phishing
Term
Once you've gathered data about a particular system or you've dealt with a computer or network problem, you need to complete the missions by telling your supervisor. This is called _____.
Definition
Incidence Reporting
Term
_____ is Microsoft's variation of the CHAP protocol using a slightly more advanced encryption protocol.
Definition
MS-CHAP
Term
A _____ is a complete program that travels from machine to machine, usually through computer networks.
Definition
Worm
Term
_____ are those surprise browser windows that appear automatically when you visit a Web site, they're basically just annoying.
Definition
Pop-ups
Term
_____ programs use different techniques to combat different types of viruses.
Definition
Antivirus
Term
Security starts with properly implemented _____, which means in essence how the computer determines who can or should access it.
Definition
Authentication
Term
A _____ is an addition to the operating system to patch a hole in the OS code.
Definition
Security Patch
Term
_____ is composed of four interlinked areas that a good security-minded tech should think about: physical security, authentication, users and groups, and security policies.
Definition
Access Control
Term
Programs that intrude unwanted into your computing experience but don’t do any damage to your system or data are called _____.
Definition
Grayware
Term
A computer _____ is a piece of malicious software that gets passed from a computer to computer.
Definition
Virus
Term
_____ simply means that you fix things the virus harmed.
Definition
Remediation
Term
_____ provides transparent encryption methods between the server and the client.
Definition
IPSec
Term
_____ are true, freestanding programs that do something other than what the person who runs the program thinks they will do.
Definition
Trojans
Term
The _____ Edits policy makes it so that if you try to edit the Registry, you get failure message.
Definition
Prevent Registry
Term
_____ is the generic term for anytime a hacker goes through your refuse, looking for information.
Definition
Dumpster Diving
Term
Make sure you and your users use _____ passwords: at least 8 characters long, including letters, numbers, and punctuation symbols.
Definition
Strong
Term
_____ is the most common remote access protocol, by which the serving system challenges the remote client by asking the remote client some secret, usually a password.
Definition
CHAP
Term
_____ defines a family of programs the run in the background on your PC, sending information about your browsing habits to the company that installed it on your system.
Definition
Spyware
Term
In all network operating systems, the permissions of the groups are combined, and the result is what you call the _____ permissions the user has to access the resource.
Definition
Effective
Term
_____ are devices or software that protect and internal network from unauthorized access to and from the internet at large.
Definition
Firewalls
Term
The process of using or manipulating people inside the networking environment to gain access to that network from the outside is called.
Definition
Social Engineering
Term
_____ is the oldest and most basic form of authentication.
Definition
PAP
Term
_____ access occurs when a person accesses resources without permission.
Definition
Unauthorized
Term
By using _____ you can exercise deity-like control over your network clients.
Definition
Group Policy
Term
_____ in the security sense means to tell Windows to create an entry in the Security Log when certain events happen.
Definition
Auditing
Term
_____ is a common form of infiltration.
Definition
Tailgating
Term
Devices that require some sort of physical, flesh and blood authentication are called _____ devices.
Definition
Biometric
Term
_____ means that members of an organization or company must abide by or comply with all of the rules that apply to the organization or company.
Definition
Compliance
Term
_____ are probably the most common social engineering attack.
Definition
Telephone Scams
Term
The _____ Length policy forces a minimum password length.
Definition
Minimum Password
Term
The _____ policy defines how you may along on the system locally.
Definition
Log on Locally
Term
The list of virus signatures your antivirus programs can recognize is called the _____ file.
Definition
Definition
Term
The most famous of all application encryptions is Netscape's _____ security protocol, which is used to create secure Web sites.
Definition
SSL
Term
_____ works like spyware to display ads on your system.
Definition
Adware
Supporting users have an ad free experience!