Shared Flashcard Set

Details

Network Security
Final Exam
50
Computer Networking
Graduate
11/02/2010

Additional Computer Networking Flashcards

 


 

Cards

Term
What ensures that the information is correct and no unauthorized person or malicious software has altered the data?(Page 10)
Definition
Integrity
Term
What involves using someone's personal information such as a Social Security number,to establish bank or credit card accounts that are then left unpaid, leaving the victim with the debt and ruining their credit rating? (Page 13)
Definition
Identity Theft
Term
Targeted attacks against financial networks,unauthorized access to information, and the theft of personal information is sometimes known as what? (Page 18)
Definition
Cybercrime
Term
What is a software program that delivers advertising content in a manner that is unexpected and unwanted by the user? (Page 52)
Definition
Adware
Term
What is a single, dedicated hard disk-based file storage device that provides centralized and consolited disk storage available to LAN (Local Area Network) users through a standard network connection? (Page 57)
Definition
Network Attached Storage(NAS)
Term
When an entire operating system environment is simulated, this is known as what? (Page 59)
Definition
Operating system virtualization
Term
When this technology enables a virtual machine to be moved to a different physical computer with no impact to the user-the virtual machine stores it current state on to a share storage device immediately before ___________ occurs. (Page 61)
Definition
Live migration
Term
Live migration can also be used for_____if the demand for a service or application increases then network managers can quickly move this high-demand virtual machine to another physical server with more RAM(Random Access Memory) or CPU (Central processing Unit) resources. (Page 61)
Definition
Load Balancing
Term
What is a Windows Vista and Windows XP Service Pack 2(SP2) feature that prevents attackers from using buffer overflow to execute malware? (Page 86)
Definition
Data Execution Prevention (DEP)
Term
What is configuration baseline?(Page 88)
Definition
This is when the operating system configuration settings that will be used for each computer in the organization.
Term
What is a computer programming language that is typically interpreted into a language the computer can understand? (Page 90)
Definition
Scripting Language
Term
What allows the administrator to configure the switch to redirect traffic that occurs on some or all ports to a designated monitoring port on the switch? (Page 121)
Definition
Port Mirroring
Term
What makes a copy of the transmission before sending it to the recipient? (Page 131)
Definition
Replay Attack
Term
What is the most common protocol suite used today for networks as well as the Internet? (Page 131)
Definition
Transmission Control Protocol/Internet Protocol(TCP/IP)
Term
When TCP/IP was developed, the host table concept was expanded to a hierarchical name system known as the what? (Page 132)
Definition
Domain Name System(DNS)
Term
What enables the attacker's computer to foward any network traffic it receives from Computer A to the actual router? (Page 136)
Definition
IP Fowarding
Term
When a group of piconets in which connections exists between different piconets is called what? (Page 140)
Definition
Scatternet
Term
What is connected directly to the devices on the network? (Page 156)
Definition
Workgroup Switches
Term
What is used mainly by organizations to capture limited information regarding attacks on that organizations honey-pot? (Page 170)
Definition
Production Honeypots
Term
What monitors Internet traffic and blocks access to preselected Web sites and files? (Page 174)
Definition
Internet Content Filters(ICF)
Term
What standard specifies a maximum speed of 54 Mbps using the 5GHz spectrum? (Page 192)
Definition
IEEE 802.11a
Term
At regular intervals (normally every 100 microseconds) a wireless AP sends a _______ frame to announce its presence and to provide the necessary information for devices that want to join the network this is called what? (Page 138)
Definition
Beaconing
Term
In 2002 the WECA organization changed its name to which reflected the name of the certification that it uses (Wi-Fi) to verify that a product follows IEEE standards.(Page 203)
Definition
Wi-Fi(Wireless Fidelity)Alliance
Term
Access points have a setting called ________ ,which is what the PSK uses as a seed value to generate new keys. (Page 203)
Definition
Group Key Renewal)
Term
WPA replaces WEP with an encryption technology called what? (Page 203)
Definition
Temporal Key Integrity Protocol (TKIP)
Term
What allows a device to become authenticated to an AP(Access Point) before moving into range of the AP(Access Point)
Definition
Pre-Authentication
Term
The third access control model is considered a more "real world" approach than the other models what is this model called? (Page 232)
Definition
Role Based Access Control (RBAC)
Term
What practice requires that if the fraudulent application of a process could potentially result in a breach of security, then the process should be divided between two or more individuals? (Page 233)
Definition
Separation Of Duties
Term
What makes password attacks easier by creating a large pregenerated data set of hashes from nearly every possible password combination? (Page 240)
Definition
Rainbow Tables
Term
What kind of combination locks use buttons that must be pushed in the proper sequence to open the door? (Page 246)
Definition
Cipher Locks
Term
What is a decentralized open source FIM(Federated Identity Management) that does not require specific software to be installed on the desktop? (Page 277)
Definition
OpenID
Term
The International Organization for Standardization (ISO) created a standard for directory services known as? (Page 281)
Definition
X.500
Term
What takes a snapshot of the security of the organization as it nows stands? (Page 308)
Definition
Vulnerability Appraisal
Term
What does open port mean? (Page 313)
Definition
It means that the application or service assigned to that port is listening
Term
What protocol provides support to IP in the form of ___________ messages that allow different types of communication to occur between IP devices? (Page 314)
Definition
Internet Control Message Protocol (ICMP)
Term
What is a genric term that refers to a range of products that looks for vulnerabilities in networks or systems? (Page 317)
Definition
Vulnerability Scanner
Term
Who periodically reviews security settings and maintains records of access by end users? (Page 228)
Definition
Custodian
Term
Premission given to a higher level"parent"will also be __________ by a lower level"child" (Page 339)
Definition
Inheritance
Term
What is designed for detecting statistical anomalies? (Page 338)
Definition
Anomaly-based monitoring
Term
_______ also called one-way _____ is a process for creating a unique "signature" for a set of data. (Page 371)
Definition
Hashing
Term
The simplest type of stream cipher is a ? (Page 376)
Definition
Substitution cipher
Term
What is a block cipher that processes blocks of 64 bits? (Page 381)
Definition
RC2(Rivest Cipher)2
Term
The asymmetric algorithm RSA was published in 1977 who patented it and what year was it? (Page 385)
Definition
MIT 1983
Term
What is essentiaaly a chip on the motherboard of the computer that provides cryptographic services? (Page 388)
Definition
Trusted Platform Module (TPM)
Term
When Bob sends one digtal certificate to Alice along with his message, what is this known as? (Page 407)
Definition
Single-sided Certificate
Term
What has multiple CA's that sign digital certificates
Definition
Disturbuted Trust Model
Term
What sprays the area with pressurized water? (Page443)
Definition
Water Sprinkler System
Term
What does not harm people, document, or electrical equipment in the room? (Page443)
Definition
Clean Agent Systems
Term
A system of hard drives based on _____________ can be achieved through using a technology known as what? (Page 448)
Definition
RAID (Redundant Array of Independent Drives)
Term
What refers to a methodology for making changes and keeping track of those change, often manually
Definition
Change Management
Supporting users have an ad free experience!