Shared Flashcard Set

Details

Student
desk top application
52
Computer Science
Post-Graduate
09/18/2010

Additional Computer Science Flashcards

 


 

Cards

Term

If you need information about the hardware installed what do you select

  

a) View general system information about the computer

b) View the status of my system hardware and software

c) Find information about the hardware installed on

    this computer

d) View a list of Microsoft software installed on this 

     computer 

Definition

C.

Find information about the hardware installed on this

computer

 

Page 14 

Term
The process of consolidating fragmented files and folder is called what?
Definition

Defragmentation or defragging

 

page 27

Term
What is Disk Management?
Definition

It is a system utilities that manages hard disk,  Volumes, or the partations that they contain

 

 

page 27 

Term
What does Windows Management instrumentation do?
Definition
It permits viewing and changing system properties on a remote or local computer
Term
What ensures that the information is correct and no unauthorized person or malicious software has altered the data?(Page 10)
Definition
Integrity
Term
What involves using someone's personal information such as a Social Security number,to establish bank or credit card accounts that are then left unpaid, leaving the victim with the debt and ruining their credit rating? (Page 13)
Definition
Identity Theft
Term
Targeted attacks against financial networks,unauthorized access to information, and the theft of personal information is sometimes known as what? (Page 18)
Definition
Cybercrime
Term
What is a software program that delivers advertising content in a manner that is unexpected and unwanted by the user? (Page 52)
Definition
Adware
Term
What is a single, dedicated hard disk-based file storage device that provides centralized and consolited disk storage available to LAN (Local Area Network) users through a standard network connection? (Page 57)
Definition
Network Attached Storage(NAS)
Term
When an entire operating system environment is simulated, this is known as what? (Page 59)
Definition
Operating system virtualization
Term
When this technology enables a virtual machine to be moved to a different physical computer with no impact to the user-the virtual machine stores it current state onto a share storage device immediately before ___________ occurs. (Page 61)
Definition
Live migration
Term
Live migration can also be used for_____if the demand for a service or application increases then network managers can quickly move this high-demand virtual machine to another physical server with more RAM(Random Access Memory) or CPU (Central processing Unit) resources. (Page 61)
Definition
Load Balancing
Term
What is a Windows Vista and Windows XP Service Pack 2(SP2) feature that prevents attackers from using buffer overflow to execute malware? (Page 86)
Definition
Data Execution Prevention (DEP)
Term
What is configuration baseline?(Page 88)
Definition
This is when the operating system configuration settings that will be used for each computer in the organization.
Term
What is a computer programming language that is typically interpreted into a language the computer can understand? (Page 90)
Definition
Scripting Language
Term
What allows the administrator to configure the switch to redirect traffic that occurs on some or all ports to a designated monitoring port on the switch? (Page 121)
Definition
Port Mirroring
Term
What makes a copy of the transmission before sending it to the recipient? (Page 131)
Definition
Replay Attack
Term
What is the most common protocol suite used today for networks as well as the Internet? (Page 131)
Definition
Transmission Control Protocol/Internet Protocol(TCP/IP)
Term
When TCP/IP was developed, the host table concept was expanded to a hierarchical name system known as the what? (Page 132)
Definition
Domain Name System(DNS)
Term
What enables the attacker's computer to foward any network traffic it receives from Computer A to the actual router? (Page 136)
Definition
IP Fowarding
Term
At regular intervals (normally every 100 microseconds) a wireless AP(access point) sends a _____ frame to annouce its presence and to provide the necessary information for devices that want to join the network what is this process? (Page 138)
Definition
Beaconing
Term
When a group of piconets in which connections exists between different piconets is called what? (Page 140)
Definition
Scatternet
Term
What is connected directly to the devices on the network? (Page 156)
Definition
Workgroup Switches
Term
What is used mainly by organizations to capture limited information regarding attacks on that organizations honey-pot? (Page 170)
Definition
Production Honeypots
Term
What monitors Internet traffic and blocks access to preselected Web sites and files? (Page 174)
Definition
Internet Content Filters(ICF)
Term
What standard specifies a maximum speed of 54 Mbps using the 5GHz spectrum? (Page 192)
Definition
IEEE 802.11a
Term
In 2002, the WECA organization changed its name to what? (Page 203)
Definition
WI-FI Alliance (Wireless Fidelity)
Term
Access points have a setting called_________ which is what the PSK (Preshared Key) uses as a seed value to generate new keys. (Page 203)
Definition
Group Key Renewal
Term
WPA(WI-FI Protected Access) replaces WEP(Wired Equivalent Privacy)with a encryption technology called what? (Page 203)
Definition
Temporal Key Integrity Protocol(TKIP)
Term
What allows a device to become authenticated to an AP(Access Point) before moving into range of the AP? (Page 207)
Definition
Pre-Authentication
Term
What are the duties of the custodian? (Page 228)
Definition
He periodically reviews security settings and maintains records of access by end users.
Term
The third access control model is considered a more "real world" approach than the other models what is this model called? (Page 232)
Definition
Role Based Access Control (RBAC)
Term
What practice requires that if the fraudulent application of a process could potentially result in a breach of security, then the process should be divided between two or more individuals? (Page 233)
Definition
Separation Of Duties
Term
What makes password attacks easier by creating a large pregenerated data set of hashes from nearly every possible password combination? (Page 240)
Definition
Rainbow Tables
Term
What kind of combination locks use buttons that must be pushed in the proper sequence to open the door? (Page 246)
Definition
Cipher Locks
Term
What is a decentralized open source FIM(Federated Identity Management) that does not require specific software to be installed on the desktop? (Page 277)
Definition
OpenID
Term
The International Organization for Standardization (ISO) created a standard for directory services known as? (Page 381)
Definition
X.500
Term
What takes a snapshot of the security of the organization as it nows stands? (Page 308)
Definition
Vulnerability Appraisal
Term
What does open port mean? (Page 313)
Definition
It means that the application or service assigned to that port is listening
Term
What protocol provides support to IP in the form of ___________ messages that allow different types of communication to occur between IP devices? (Page 314)
Definition
Internet Control Message Protocol (ICMP)
Term
What is a genric term that refers to a range of products that looks for vulnerabilities in networks or systems? (Page 317)
Definition
Vulnerability Scanner
Term
What is it when permission given to a higher level "parent" will also be _______ by a lower level "child"? (Page 339)
Definition
Inheritance
Term
What is designed for detecting statistical anomalies? (Page 348)
Definition
Anomaly-based monitoring
Term
What is a process for creating a unique "signature" for a set of data? (Page 371)
Definition
Hashing also called one-way hashing
Term
What is the simplest type of stream cipher? (Page 376)
Definition
Substitution cipher
Term
What is a block cipher that processes blocks of 64 bits? (Page 381)
Definition
Rivest Cipher 2 (RC2)
Term
Who patented the asymmetric algorithm RSA that was published in 1977 and when was it patented? (Page 385)
Definition
MIT 1983
Term
What chip is on the motherboard of the computer that provides crytographic services? (Page 388)
Definition
Trusted Platform Module (TPM)
Term
When bob sends one digital certificate to alice along with his message what is that known as? (Page 406)
Definition
Single-Sided Certificate
Term
What sprays the area with pressurized water? (Page 443)
Definition
Water sprinkler system
Term
A system of hard drives based on redundancy can be achieved through using a technology known as _______ which uses multiple hard disk drives for increased reliability and performance? (Page 448)
Definition
Redundant Array of Independent Drives(RAID)
Supporting users have an ad free experience!