Security+ (CompTIA) Vocabulary Quiz

studied byStudied by 5 people
4.0(1)
Get a hint
Hint

10 tape rotation

1 / 320

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

321 Terms

1

10 tape rotation

A backup rotation scheme in which ten backup tapes are used over the course of two weeks.

New cards
2

802.1X

An authentication technology used to connect devices to a LAN or WLAN. It is an example of port-based NAC.

New cards
3

acceptable use

Acceptable usage policies define the rules that restrict how a computer, network, or other system may be used.

New cards
4

access control list (ACL)

A list of permissions attached to an object. They specify what level of access a user, users, or groups have to an object. When dealing with firewalls, an ACL is a set of rules that apply to a list of network names, IP addresses. and port numbers.

New cards
5

access control model

Methodologies in which admission to physical areas, and more important computer systems, is managed and organized.

New cards
6

account expiration

The date when users' accounts they use to log on to the network expires.

New cards
7

Accounting

The tracking of data, computer usage, and network resources. Often it means logging, auditing, and monitoring of the data and resources.

New cards
8

active interception

Also known as active inception in the CompTIA 2008 Security+ objectives; normally includes a computer placed between the sender and the receiver in an effort to capture and possibly modify information.

New cards
9

ad filtering

Ways of blocking and filtering out unwanted advertisement; popup blockers and content filters are considered to be ad filtering methods.

New cards
10

Advanced Encryption Standard (AES)

An encryption standard used with WPA and WPA2. The successor to DES/3DES and is another symmetric key encryption standard composed of three different block ciphers: AES-128, AES-192, and AES-256.

New cards
11

Adware

Type of spyware that pops up advertisements based on what it has learned about the user.

New cards
12

Algorithms

Well-defined instructions that describe computations from their initial state to their final state.

New cards
13

anomaly based monitoring

Also known as statistical anomaly based; establishes a performance baseline based on a set of normal network traffic evaluations.

New cards
14

AP isolation

Each client connected to the AP will not be able to communicate with each other, but they can each still access the Internet.

New cards
15

application firewall

A firewall that can control the traffic associated with specific applications. Works all the way up to the Application Layer of the OSI model.

New cards
16

application-level gateway (ALG)

Applies security mechanisms to specific applications, such as FTP and/or BitTorrent. It supports address and port translation and checks whether the type of application traffic is allowed.

New cards
17

ARP poisoning

An attack that exploits Ethernet networks, and it may enable an attacker to sniff frames of information, modify that information, or stop it from getting to its intended destination.

New cards
18

asymmetric key algorithm

This type of cipher uses a pair of different keys to encrypt and decrypt data.

New cards
19

audit trails

Records or logs that show the tracked actions of users, whether the user was successful in the attempt.

New cards
20

Authentication

When a person's identity is confirmed. Authentication is the verification of a person's identity.

New cards
21

Authorization

When a user is granted access to specific resources when authentication is complete.

New cards
22

Availability

Data is obtainable regardless of how information is stored, accessed, or protected.

New cards
23

Backdoors

Used in computer programs to bypass normal authentication and other security mechanisms in place.

New cards
24

back-to-back perimeter

A type of DMZ where the DMZ is located between the LAN and the Internet.

New cards
25

backup generator

Part of an emergency power system used when there is an outage of regular electric grid power.

New cards
26

Baiting

When a malicious individual leaves malware-infected removable media, such as a USB drive or optical disc, lying around in plain view.

New cards
27

baseline reporting

Identification of the security posture of an application, system, or network.

New cards
28

Baselining

The process of measuring changes in networking, hardware, software, and so on.

New cards
29

behavior-based monitoring

A monitoring system that looks at the previous behavior of applications, executables, and/or the operating system and compares that to current activity on the system.

New cards
30

Biometrics

The science of recognizing humans based on one or more physical characteristics.

New cards
31

birthday attack

An attack on a hashing system that attempts to send two different messages with the same hash function, causing a collision.

New cards
32

Blackout

When a total loss of power for a prolonged period occurs.

New cards
33

block cipher

A type of algorithm that encrypts a number of bits as individual units known as blocks.

New cards
34

Bluejacking

The sending of unsolicited messages to Bluetooth-enabled devices such as mobile phones and PDAs.

New cards
35

Bluesnarfing

The unauthorized access of information from a wireless device through a Bluetooth connection.

New cards
36

Botnet

A group of compromised computers used to distribute malware across the Internet; the members are usually zombies.

New cards
37

broadcast storm

When there is an accumulation of broadcast and multicast packet traffic on the LAN coming from one or more network interfaces.

New cards
38

Brownout

When the voltage drops to such an extent that it typically causes the lights to dim and causes computers to shut off.

New cards
39

brute force attack

A password attack where every possible password is attempted.

New cards
40

buffer overflow

When a process stores data outside the memory that the developer intended. This could cause erratic behavior in the application, especially if the memory already had other data in it.

New cards
41

business impact analysis

The examination of critical versus noncritical functions, it is part of a business continuity plan (BCP).

New cards
42

butt set (or lineman's handset)

A device that looks similar to a phone but has alligator clips that can connect to the various terminals used by phone equipment, enabling a person to listen in to a conversation.

New cards
43

CAM table

The Content Addressable Memory table, a table that is in a switch's memory that contains ports and their corresponding MAC addresses.

New cards
44

certificate authority

The entity (usually a server) that issues digital certificates to users.

New cards
45

certificate revocation list (CRL)

A list of certificates no longer valid or that have been revoked by the issuer.

New cards
46

Certificates

Digitally signed electronic documents that bind a public key with a user identity.

New cards
47

chain of custody

Documents who had custody of evidence all the way up to litigation or a court trial (if necessary) and verifies that the evidence has not been modified.

New cards
48

Challenge-Handshake Authentication Protocol (CHAP)

An authentication scheme used by the Point-to-Point Protocol (PPP) that is the standard for dial-up connections.

New cards
49

change management

A structured way of changing the state of a computer system, network, or IT procedure.

New cards
50

chromatic dispersion

The refraction of light as in a rainbow. If light is refracted in such a manner on fiber optic cables, the signal cannot be read by the receiver.

New cards
51

Cipher

An algorithm that can perform encryption or decryption.

New cards
52

circuit-level gateway

Works at the Session Layer of the OSI model and applies security mechanisms when a TCP or UDP connection is established; they act as a go-between for the Transport and Application Layers in TCP/IP.

New cards
53

Cloud computing

A way of offering on-demand services that extend the capabilities of a person's computer or an organization's network.

New cards
54

Cluster

Two or more servers that work with each other.

New cards
55

cold site

This has tables, chairs, bathrooms, and possibly some technical setup, for example, basic phone, data, and electric lines, but will require days if not weeks to set up properly.

New cards
56

computer security audits

Technical assessments made of applications, systems, or networks.

New cards
57

Confidentiality

Preventing the disclosure of information to unauthorized persons.

New cards
58

content filters

Individual computer programs that block external files that use JavaScript or images from loading into the browser.

New cards
59

Cookies

Text files placed on the client computer that store information about it, which could include your computer's browsing habits and credentials. Tracking cookies are used by spyware to collect information about a web user's activities. Session cookies are used by attackers in an attempt to hijack a session.

New cards
60

cross-site request forgery (XSRF)

An attack that exploits the trust a website has in a user's browser in an attempt to transmit unauthorized commands to the website.

New cards
61

cross-site scripting (XSS)

A type of vulnerability found in web applications used with session hijacking.

New cards
62

Crosstalk

When a signal transmitted on one copper wire creates an undesired effect on another wire; the signal "bleeds" over, so to speak.

New cards
63

cryptanalysis attack

A password attack uses a considerable set of precalculated encrypted passwords located in a lookup table.

New cards
64

cryptographic hash functions

Hash functions based on block ciphers.

New cards
65

Cryptography

The practice and study of hiding information.

New cards
66

data emanation (or signal emanation)

The electromagnetic field generated by a network cable or network device, which can be manipulated to eavesdrop on conversations or to steal data.

New cards
67

Data Encryption Standard (DES)

An older type of block cipher selected by the United States federal government back in the 1970s as its encryption standard; due to its weak key, it is now considered deprecated.

New cards
68

data loss prevention (DLP)

Systems that are designed to protect data by way of content inspection. They are meant to stop the leakage of confidential data, often concentrating on communications.

New cards
69

default account

An account installed by default on a device or within an operating system with a default set of user credentials that are usually insecure.

New cards
70

Defense in depth

The building up and layering of security measures that protect data from inception, on through storage and network transfer, and lastly to final disposal.

New cards
71

demilitarized zone (DMZ)

A special area of the network (sometimes referred to as a subnetwork) that houses servers that host information accessed by clients or other networks on the Internet.

New cards
72

Denial of Service (DoS)

A broad term given to many different types of network attacks that attempt to make computer resources unavailable.

New cards
73

dictionary attack

A password attack that uses a prearranged list of likely words, trying each of them one at a time.

New cards
74

differential backup

Type of backup that backs up only the contents of a folder that have changed since the last full backup.

New cards
75

Diffie-Hellman key exchange

Invented in the 1970s, it was the first practical method for establishing a shared secret key over an unprotected communications channel.

New cards
76

digital signature

A signature that authenticates a document through math, letting the recipient know that the document was created and sent by the actual sender and not someone else.

New cards
77

directory traversal

Also known as the ../ (dot dot slash) attack is a method of accessing unauthorized parent directories.

New cards
78

disaster recovery plan

A plan that details the policies and procedures concerning the recovery and/or continuation of an organization's technology infrastructure.

New cards
79

discretionary access control (DAC)

An access control policy generally determined by the owner.

New cards
80

disk duplexing

When each disk is connected to a separate controller.

New cards
81

Distributed Denial of Service (DDoS)

An attack in which a group of compromised systems attack a single target, causing a DoS to occur at that host, usually using a botnet.

New cards
82

diversion theft

When a thief attempts to take responsibility for a shipment by diverting the delivery to a nearby location.

New cards
83

DNS poisoning

The modification of name resolution information that should be in a DNS server's cache.

New cards
84

domain name kiting

The process of deleting a domain name during the five-day grace period (known as the add grace period or AGP) and immediately reregistering it for another five-day period to keep a domain name indefinitely and for free.

New cards
85

due care

The mitigation action that an organization takes to defend against the risks that have been uncovered during due diligence.

New cards
86

due diligence

Ensuring that IT infrastructure risks are known and managed.

New cards
87

due process

The principle that an organization must respect and safeguard personnel's rights.

New cards
88

dumpster diving

When a person literally scavenges for private information in garbage and recycling containers.

New cards
89

Easter egg

A platonic extra added to an OS or application as a sort of joke; the harmless cousin of the logic bomb.

New cards
90

Eavesdropping

When a person uses direct observation to "listen" in to a conversation.

New cards
91

electromagnetic interference (EMI)

A disturbance that can affect electrical circuits,devices, and cables due to electromagnetic conduction or radiation.

New cards
92

elliptic curve cryptography (ECC)

A type of public key cryptography based on thestructure of an elliptic curve.

New cards
93

Encryption

The process of changing information using an algorithm (or cipher) into another form that is unreadable by others—unless they possess the key to that data.

New cards
94

ethical hacker

an expert at breaking into systems and can attack systems on behalf of the system's owner and with the owner's consent.

New cards
95

explicit allow

When an administrator sets a rule that allows a specific type of traffic through a firewall, often within an ACL.

New cards
96

explicit deny

When an administrator sets a rule that denies a specific type of traffic access through a firewall, often within an ACL.

New cards
97

Extensible Authentication Protocol (EAP)

Not an authentication mechanism in itself but instead defines message formats. 802.1X would be the authentication mechanism and defines how EAP is encapsulated within messages.

New cards
98

failopen mode

When a switch broadcasts data on all ports the way a hub does.

New cards
99

failover clusters

Also known as high-availability clusters, these are designed so that a secondary server can take over in the case that the primary one fails, with limited or no downtime.

New cards
100

false negative

When a system denies a user who actually should be allowed access to the system. For example, when an IDS/IPS fails to block an attack, thinking it is legitimate traffic.

New cards

Explore top notes

note Note
studied byStudied by 5 people
Updated ... ago
4.5 Stars(2)
note Note
studied byStudied by 7 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 6 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 2 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 6 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 5 people
Updated ... ago
5.0 Stars(2)
note Note
studied byStudied by 11 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 89 people
Updated ... ago
5.0 Stars(5)

Explore top flashcards

flashcards Flashcard69 terms
studied byStudied by 26 people
Updated ... ago
5.0 Stars(2)
flashcards Flashcard37 terms
studied byStudied by 67 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard38 terms
studied byStudied by 9 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard75 terms
studied byStudied by 3 people
Updated ... ago
5.0 Stars(2)
flashcards Flashcard201 terms
studied byStudied by 9 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard72 terms
studied byStudied by 7 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard36 terms
studied byStudied by 4 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard44 terms
studied byStudied by 74 people
Updated ... ago
5.0 Stars(1)