Podcast
Questions and Answers
What is the primary purpose of Access Control?
What is the primary purpose of Access Control?
What is an Access Control List (ACL)?
What is an Access Control List (ACL)?
What is the main function of an Access Control Service?
What is the main function of an Access Control Service?
What is the purpose of an Access Matrix?
What is the purpose of an Access Matrix?
Signup and view all the answers
What is ACK Piggybacking?
What is ACK Piggybacking?
Signup and view all the answers
What is the primary function of Activity Monitors?
What is the primary function of Activity Monitors?
Signup and view all the answers
What is the primary characteristic of a circuit-switched network?
What is the primary characteristic of a circuit-switched network?
Signup and view all the answers
What is the main purpose of a cloud computing system?
What is the main purpose of a cloud computing system?
Signup and view all the answers
Which type of disaster recovery site is the most expensive option?
Which type of disaster recovery site is the most expensive option?
Signup and view all the answers
What is the term for the unauthorized disclosure of information?
What is the term for the unauthorized disclosure of information?
Signup and view all the answers
What is the purpose of a Computer Emergency Response Team (CERT)?
What is the purpose of a Computer Emergency Response Team (CERT)?
Signup and view all the answers
What is the term for the process of exchanging data between an HTTP server and a client?
What is the term for the process of exchanging data between an HTTP server and a client?
Signup and view all the answers
What is the primary goal of a cost-benefit analysis in the context of security?
What is the primary goal of a cost-benefit analysis in the context of security?
Signup and view all the answers
What is the term for the threat action that undesirably alters system operation?
What is the term for the threat action that undesirably alters system operation?
Signup and view all the answers
What is the purpose of a client in a network?
What is the purpose of a client in a network?
Signup and view all the answers
What is the term for the process of detecting and responding to security incidents?
What is the term for the process of detecting and responding to security incidents?
Signup and view all the answers
What is the primary purpose of a Distance Vector?
What is the primary purpose of a Distance Vector?
Signup and view all the answers
What is Domain Hijacking?
What is Domain Hijacking?
Signup and view all the answers
What is the purpose of a Domain Name System (DNS)?
What is the purpose of a Domain Name System (DNS)?
Signup and view all the answers
What is Due Care?
What is Due Care?
Signup and view all the answers
What is the purpose of DumpSec?
What is the purpose of DumpSec?
Signup and view all the answers
What is the primary purpose of Dynamic Routing Protocols?
What is the primary purpose of Dynamic Routing Protocols?
Signup and view all the answers
What is Eavesdropping?
What is Eavesdropping?
Signup and view all the answers
What is the purpose of an Echo Request?
What is the purpose of an Echo Request?
Signup and view all the answers
What is the primary purpose of Egress Filtering?
What is the primary purpose of Egress Filtering?
Signup and view all the answers
What is a Domain in Windows NT and Windows 2000?
What is a Domain in Windows NT and Windows 2000?
Signup and view all the answers
What is the primary purpose of a firewall?
What is the primary purpose of a firewall?
Signup and view all the answers
What is the goal of flooding an attack?
What is the goal of flooding an attack?
Signup and view all the answers
What is a forest in the context of Active Directory?
What is a forest in the context of Active Directory?
Signup and view all the answers
What is the purpose of a fork bomb?
What is the purpose of a fork bomb?
Signup and view all the answers
What is the purpose of fingerprinting?
What is the purpose of fingerprinting?
Signup and view all the answers
Which protocol is used to exchange routing information for the Internet and is the protocol used between Internet service providers (ISP)?
Which protocol is used to exchange routing information for the Internet and is the protocol used between Internet service providers (ISP)?
Signup and view all the answers
What is the process of simultaneously sending the same message to multiple recipients?
What is the process of simultaneously sending the same message to multiple recipients?
Signup and view all the answers
What is a standard code of practice that provides guidance on how to secure an information system?
What is a standard code of practice that provides guidance on how to secure an information system?
Signup and view all the answers
What is a unit of data transmitted over an ATM network?
What is a unit of data transmitted over an ATM network?
Signup and view all the answers
What is a cryptographic algorithm for encryption and decryption?
What is a cryptographic algorithm for encryption and decryption?
Signup and view all the answers
What is a client computer program that can retrieve and display information from servers on the World Wide Web?
What is a client computer program that can retrieve and display information from servers on the World Wide Web?
Signup and view all the answers
What is the encrypted form of the message being sent?
What is the encrypted form of the message being sent?
Signup and view all the answers
What is a business plan that outlines emergency response, backup operations, and post-disaster recovery steps?
What is a business plan that outlines emergency response, backup operations, and post-disaster recovery steps?
Signup and view all the answers
What is a technique used to trick a browser to run cached Java code from the local disk, instead of the internet zone, so it runs with less restrictive permissions?
What is a technique used to trick a browser to run cached Java code from the local disk, instead of the internet zone, so it runs with less restrictive permissions?
Signup and view all the answers
What is a value that is computed by a function that is dependent on the contents of a data object and is stored or transmitted together with the object, for the purpose of detecting changes in the data?
What is a value that is computed by a function that is dependent on the contents of a data object and is stored or transmitted together with the object, for the purpose of detecting changes in the data?
Signup and view all the answers
What is the primary function of the Address Resolution Protocol (ARP)?
What is the primary function of the Address Resolution Protocol (ARP)?
Signup and view all the answers
What is the main characteristic of Asymmetric Cryptography?
What is the main characteristic of Asymmetric Cryptography?
Signup and view all the answers
What is the purpose of Auditing in the context of information security?
What is the purpose of Auditing in the context of information security?
Signup and view all the answers
What is the definition of Availability in the context of information security?
What is the definition of Availability in the context of information security?
Signup and view all the answers
What is the purpose of a Backdoor in the context of information security?
What is the purpose of a Backdoor in the context of information security?
Signup and view all the answers
What is the definition of Bandwidth in the context of information security?
What is the definition of Bandwidth in the context of information security?
Signup and view all the answers
What is the purpose of a Banner in the context of information security?
What is the purpose of a Banner in the context of information security?
Signup and view all the answers
What is the definition of Biometrics in the context of information security?
What is the definition of Biometrics in the context of information security?
Signup and view all the answers
What is the purpose of a Boot Record Infector?
What is the purpose of a Boot Record Infector?
Signup and view all the answers
What is the definition of Basic Authentication in the context of information security?
What is the definition of Basic Authentication in the context of information security?
Signup and view all the answers
What is the primary purpose of an Intrusion Prevention System (IPS)?
What is the primary purpose of an Intrusion Prevention System (IPS)?
Signup and view all the answers
What is the purpose of a covert channel?
What is the purpose of a covert channel?
Signup and view all the answers
What is crimineware?
What is crimineware?
Signup and view all the answers
What is the purpose of a cron job?
What is the purpose of a cron job?
Signup and view all the answers
What is the purpose of a crossover cable?
What is the purpose of a crossover cable?
Signup and view all the answers
What is cryptanalysis?
What is cryptanalysis?
Signup and view all the answers
What is the purpose of a cyclic redundancy check (CRC)?
What is the purpose of a cyclic redundancy check (CRC)?
Signup and view all the answers
What is a daemon?
What is a daemon?
Signup and view all the answers
What is data aggregation?
What is data aggregation?
Signup and view all the answers
What is the purpose of a data custodian?
What is the purpose of a data custodian?
Signup and view all the answers
What is the primary characteristic of a connectionless protocol?
What is the primary characteristic of a connectionless protocol?
Signup and view all the answers
What is the 'Day Zero' in the context of computer security?
What is the 'Day Zero' in the context of computer security?
Signup and view all the answers
What is the process of stripping off one layer's headers and passing the rest of the packet up to the next higher layer on the protocol stack?
What is the process of stripping off one layer's headers and passing the rest of the packet up to the next higher layer on the protocol stack?
Signup and view all the answers
What is the process of transforming an encrypted message into its original plaintext?
What is the process of transforming an encrypted message into its original plaintext?
Signup and view all the answers
What is the method of modifying the content of a website in such a way that it becomes 'vandalized' or embarrassing to the website owner?
What is the method of modifying the content of a website in such a way that it becomes 'vandalized' or embarrassing to the website owner?
Signup and view all the answers
What is the approach of using multiple layers of security to guard against failure of a single security component?
What is the approach of using multiple layers of security to guard against failure of a single security component?
Signup and view all the answers
What is a network area that sits between an organization's internal network and an external network, usually the Internet?
What is a network area that sits between an organization's internal network and an external network, usually the Internet?
Signup and view all the answers
What is an attack that tries all of the phrases or words in a dictionary, trying to crack a password or key?
What is an attack that tries all of the phrases or words in a dictionary, trying to crack a password or key?
Signup and view all the answers
What is a key agreement algorithm published in 1976 by Whitfield Diffie and Martin Hellman?
What is a key agreement algorithm published in 1976 by Whitfield Diffie and Martin Hellman?
Signup and view all the answers
What is an electronic 'credit card' that establishes your credentials when doing business or other transactions on the Web?
What is an electronic 'credit card' that establishes your credentials when doing business or other transactions on the Web?
Signup and view all the answers
What is the purpose of Emanations Analysis?
What is the purpose of Emanations Analysis?
Signup and view all the answers
What is the main characteristic of an Ephemeral Port?
What is the main characteristic of an Ephemeral Port?
Signup and view all the answers
What is the purpose of Escrow Passwords?
What is the purpose of Escrow Passwords?
Signup and view all the answers
What is the primary function of Ethernet?
What is the primary function of Ethernet?
Signup and view all the answers
What is the purpose of an Exponential Backoff Algorithm?
What is the purpose of an Exponential Backoff Algorithm?
Signup and view all the answers
What is the main characteristic of an Extended ACL?
What is the main characteristic of an Extended ACL?
Signup and view all the answers
What is the primary function of the File Transfer Protocol (FTP)?
What is the primary function of the File Transfer Protocol (FTP)?
Signup and view all the answers
What is the main purpose of a Filter in a network?
What is the main purpose of a Filter in a network?
Signup and view all the answers
What is the primary function of a Finger protocol?
What is the primary function of a Finger protocol?
Signup and view all the answers
What is an Event in a system or network?
What is an Event in a system or network?
Signup and view all the answers
What is the primary goal of flooding an attack?
What is the primary goal of flooding an attack?
Signup and view all the answers
What is the purpose of a forward lookup?
What is the purpose of a forward lookup?
Signup and view all the answers
What is the result of a fork bomb attack?
What is the result of a fork bomb attack?
Signup and view all the answers
What is the purpose of form-based authentication?
What is the purpose of form-based authentication?
Signup and view all the answers
What is the fragment offset field used for?
What is the fragment offset field used for?
Signup and view all the answers
What is the purpose of a forward proxy?
What is the purpose of a forward proxy?
Signup and view all the answers
What is the process of storing a data file in several chunks or fragments rather than in a single contiguous sequence of bits?
What is the process of storing a data file in several chunks or fragments rather than in a single contiguous sequence of bits?
Signup and view all the answers
What is a network point that acts as an entrance to another network?
What is a network point that acts as an entrance to another network?
Signup and view all the answers
What is a type of duplex communications channel that carries data in both directions at once?
What is a type of duplex communications channel that carries data in both directions at once?
Signup and view all the answers
What is a Unix-like operating system that comes with source code that can be copied, modified, and redistributed?
What is a Unix-like operating system that comes with source code that can be copied, modified, and redistributed?
Signup and view all the answers
What is an algorithm that computes a value based on a data object, thereby mapping the data object to a smaller data object?
What is an algorithm that computes a value based on a data object, thereby mapping the data object to a smaller data object?
Signup and view all the answers
What is a type of attack that seizes control of a previously established communication association?
What is a type of attack that seizes control of a previously established communication association?
Signup and view all the answers
What is a server name with a hostname followed by the full domain name?
What is a server name with a hostname followed by the full domain name?
Signup and view all the answers
What is a type of file sharing utility that acts as a server and client simultaneously?
What is a type of file sharing utility that acts as a server and client simultaneously?
Signup and view all the answers
What is the process of identifying and fixing vulnerabilities on a system?
What is the process of identifying and fixing vulnerabilities on a system?
Signup and view all the answers
What is a type of intrusion detection system that uses information from the operating system audit records to watch all operations occurring on the host?
What is a type of intrusion detection system that uses information from the operating system audit records to watch all operations occurring on the host?
Signup and view all the answers
What is the primary function of an HTTP Proxy?
What is the primary function of an HTTP Proxy?
Signup and view all the answers
What is the purpose of a Hybrid Attack?
What is the purpose of a Hybrid Attack?
Signup and view all the answers
What is the primary function of Incident Handling?
What is the primary function of Incident Handling?
Signup and view all the answers
What is the purpose of Ingress Filtering?
What is the purpose of Ingress Filtering?
Signup and view all the answers
What is the primary function of the Internet Control Message Protocol (ICMP)?
What is the primary function of the Internet Control Message Protocol (ICMP)?
Signup and view all the answers
What is the primary function of the Internet Message Access Protocol (IMAP)?
What is the primary function of the Internet Message Access Protocol (IMAP)?
Signup and view all the answers
What is the purpose of Integrity in the context of information security?
What is the purpose of Integrity in the context of information security?
Signup and view all the answers
What is the primary function of a Hub?
What is the primary function of a Hub?
Signup and view all the answers
What is the purpose of a Hybrid Encryption?
What is the purpose of a Hybrid Encryption?
Signup and view all the answers
What is the purpose of Information Warfare?
What is the purpose of Information Warfare?
Signup and view all the answers
What is the purpose of L2TP?
What is the purpose of L2TP?
Signup and view all the answers
What is the principle of allowing users the least amount of permissions necessary to perform their intended function?
What is the principle of allowing users the least amount of permissions necessary to perform their intended function?
Signup and view all the answers
What is a type of attack in which one system entity illegitimately poses as another entity?
What is a type of attack in which one system entity illegitimately poses as another entity?
Signup and view all the answers
What is the process of selectively removing log entries from a system log to hide a compromise?
What is the process of selectively removing log entries from a system log to hide a compromise?
Signup and view all the answers
What is a software protocol for enabling anyone to locate organizations and individuals in a network?
What is a software protocol for enabling anyone to locate organizations and individuals in a network?
Signup and view all the answers
What is a type of cyber attack in which the attacker intercepts and relays messages between two parties?
What is a type of cyber attack in which the attacker intercepts and relays messages between two parties?
Signup and view all the answers
What is a one-way cryptographic hash function?
What is a one-way cryptographic hash function?
Signup and view all the answers
What is the term for the ability to attack or defend within an Internet environment?
What is the term for the ability to attack or defend within an Internet environment?
Signup and view all the answers
What is the purpose of NAT?
What is the purpose of NAT?
Signup and view all the answers
What is a type of program that executes when a certain predefined event occurs?
What is a type of program that executes when a certain predefined event occurs?
Signup and view all the answers
What is the primary function of IP Forwarding?
What is the primary function of IP Forwarding?
Signup and view all the answers
What is the purpose of an Intranet?
What is the purpose of an Intranet?
Signup and view all the answers
What is Intrusion Detection?
What is Intrusion Detection?
Signup and view all the answers
What is an IP Address?
What is an IP Address?
Signup and view all the answers
What is IP Spoofing?
What is IP Spoofing?
Signup and view all the answers
What is the main purpose of NAT in a home or small business network?
What is the main purpose of NAT in a home or small business network?
Signup and view all the answers
What is ISO?
What is ISO?
Signup and view all the answers
What is a Netmask?
What is a Netmask?
Signup and view all the answers
What is an Issue-Specific Policy?
What is an Issue-Specific Policy?
Signup and view all the answers
What is Network-Based IDS?
What is Network-Based IDS?
Signup and view all the answers
What is Jitter?
What is Jitter?
Signup and view all the answers
What is the purpose of Non-Repudiation?
What is the purpose of Non-Repudiation?
Signup and view all the answers
What is a Jump Bag?
What is a Jump Bag?
Signup and view all the answers
What is an Octet?
What is an Octet?
Signup and view all the answers
What is the primary function of the Kernel?
What is the primary function of the Kernel?
Signup and view all the answers
What is One-Way Encryption?
What is One-Way Encryption?
Signup and view all the answers
What is the purpose of a Null Session?
What is the purpose of a Null Session?
Signup and view all the answers
What is Network Mapping?
What is Network Mapping?
Signup and view all the answers
What is Network Taps?
What is Network Taps?
Signup and view all the answers
What is Non-Printable Character?
What is Non-Printable Character?
Signup and view all the answers
What is the primary function of the network layer in the OSI model?
What is the primary function of the network layer in the OSI model?
Signup and view all the answers
What is the purpose of the OSI model?
What is the purpose of the OSI model?
Signup and view all the answers
What is the main idea behind the OSI model?
What is the main idea behind the OSI model?
Signup and view all the answers
What is the application layer responsible for in the OSI model?
What is the application layer responsible for in the OSI model?
Signup and view all the answers
What is the presentation layer responsible for in the OSI model?
What is the presentation layer responsible for in the OSI model?
Signup and view all the answers
What is the transport layer responsible for in the OSI model?
What is the transport layer responsible for in the OSI model?
Signup and view all the answers
What is the session layer responsible for in the OSI model?
What is the session layer responsible for in the OSI model?
Signup and view all the answers
What is the primary function of OSPF?
What is the primary function of OSPF?
Signup and view all the answers
What is the characteristic of a one-way function?
What is the characteristic of a one-way function?
Signup and view all the answers
What is the advantage of the OSI model?
What is the advantage of the OSI model?
Signup and view all the answers
What is the primary function of the data-link layer?
What is the primary function of the data-link layer?
Signup and view all the answers
What is the main purpose of a packet in a packet-switched network?
What is the main purpose of a packet in a packet-switched network?
Signup and view all the answers
What is the goal of password sniffing?
What is the goal of password sniffing?
Signup and view all the answers
What is pharming?
What is pharming?
Signup and view all the answers
What is the primary function of a personal firewall?
What is the primary function of a personal firewall?
Signup and view all the answers
What is the purpose of a patch?
What is the purpose of a patch?
Signup and view all the answers
What is the term for the actual application data a packet contains?
What is the term for the actual application data a packet contains?
Signup and view all the answers
What is the purpose of penetration testing?
What is the purpose of penetration testing?
Signup and view all the answers
What is phishing?
What is phishing?
Signup and view all the answers
What is the purpose of a ping scan?
What is the purpose of a ping scan?
Signup and view all the answers
What is the main purpose of Point-to-Point Tunneling Protocol (PPTP)?
What is the main purpose of Point-to-Point Tunneling Protocol (PPTP)?
Signup and view all the answers
What is the effect of poison reverse in routing updates?
What is the effect of poison reverse in routing updates?
Signup and view all the answers
What is polyinstantiation?
What is polyinstantiation?
Signup and view all the answers
What is the purpose of a port scan?
What is the purpose of a port scan?
Signup and view all the answers
What is possession in the context of information security?
What is possession in the context of information security?
Signup and view all the answers
What is polymorphism in the context of malicious software?
What is polymorphism in the context of malicious software?
Signup and view all the answers
What is the primary function of a Post Office Protocol, Version 3 (POP3)?
What is the primary function of a Post Office Protocol, Version 3 (POP3)?
Signup and view all the answers
What is the purpose of a preamble in network communications?
What is the purpose of a preamble in network communications?
Signup and view all the answers
What is the term for the address ranges set aside for use by private or non-Internet connected networks?
What is the term for the address ranges set aside for use by private or non-Internet connected networks?
Signup and view all the answers
What type of malware attaches itself to existing program files?
What type of malware attaches itself to existing program files?
Signup and view all the answers
What is the purpose of a Promiscuous Mode?
What is the purpose of a Promiscuous Mode?
Signup and view all the answers
What is the definition of a Protocol?
What is the definition of a Protocol?
Signup and view all the answers
What is the primary purpose of Public-Key Forward Secrecy?
What is the primary purpose of Public-Key Forward Secrecy?
Signup and view all the answers
What is the primary purpose of a Ransomware?
What is the primary purpose of a Ransomware?
Signup and view all the answers
What is the purpose of a Public Key Infrastructure (PKI)?
What is the purpose of a Public Key Infrastructure (PKI)?
Signup and view all the answers
What is the primary function of a Proxy Server?
What is the primary function of a Proxy Server?
Signup and view all the answers
What is the primary purpose of a Reconnaissance?
What is the primary purpose of a Reconnaissance?
Signup and view all the answers
What is the primary purpose of Reflexive ACLs?
What is the primary purpose of Reflexive ACLs?
Signup and view all the answers
What is the term for a program that executes when a certain predefined event occurs?
What is the term for a program that executes when a certain predefined event occurs?
Signup and view all the answers
What is the purpose of a Private Addressing?
What is the purpose of a Private Addressing?
Signup and view all the answers
What is the primary purpose of Radiation Monitoring?
What is the primary purpose of Radiation Monitoring?
Signup and view all the answers
What is the primary purpose of a Response?
What is the primary purpose of a Response?
Signup and view all the answers
What is the primary purpose of Reverse Engineering?
What is the primary purpose of Reverse Engineering?
Signup and view all the answers
What is the primary purpose of Risk Assessment?
What is the primary purpose of Risk Assessment?
Signup and view all the answers
What is the primary purpose of RARP?
What is the primary purpose of RARP?
Signup and view all the answers
What is the primary purpose of RSA?
What is the primary purpose of RSA?
Signup and view all the answers
What is the purpose of Role-Based Access Control?
What is the purpose of Role-Based Access Control?
Signup and view all the answers
What is a Router used for?
What is a Router used for?
Signup and view all the answers
What is a security mechanism that uses a cryptographic hash function?
What is a security mechanism that uses a cryptographic hash function?
Signup and view all the answers
What is the purpose of Secure Electronic Transactions (SET)?
What is the purpose of Secure Electronic Transactions (SET)?
Signup and view all the answers
What is the purpose of a Server?
What is the purpose of a Server?
Signup and view all the answers
What is a Segment?
What is a Segment?
Signup and view all the answers
What is Sensitive Information?
What is Sensitive Information?
Signup and view all the answers
What is a Session?
What is a Session?
Signup and view all the answers
What is a Session Key?
What is a Session Key?
Signup and view all the answers
What is a Share?
What is a Share?
Signup and view all the answers
What is the primary function of the Transmission Control Protocol (TCP)?
What is the primary function of the Transmission Control Protocol (TCP)?
Signup and view all the answers
What is the purpose of Trunking in computer networks?
What is the purpose of Trunking in computer networks?
Signup and view all the answers
What is the primary function of the User Datagram Protocol (UDP)?
What is the primary function of the User Datagram Protocol (UDP)?
Signup and view all the answers
What is the purpose of a Tunnel in computer networks?
What is the purpose of a Tunnel in computer networks?
Signup and view all the answers
What is the primary function of the Uniform Resource Locator (URL)?
What is the primary function of the Uniform Resource Locator (URL)?
Signup and view all the answers
What is the purpose of Trust in computer networks?
What is the purpose of Trust in computer networks?
Signup and view all the answers
What is the primary function of the Transport Layer Security (TLS) protocol?
What is the primary function of the Transport Layer Security (TLS) protocol?
Signup and view all the answers
What is the purpose of a Trojan Horse in computer networks?
What is the purpose of a Trojan Horse in computer networks?
Signup and view all the answers
What is the primary function of the Traceroute tool?
What is the primary function of the Traceroute tool?
Signup and view all the answers
What is the purpose of Unicast in computer networks?
What is the purpose of Unicast in computer networks?
Signup and view all the answers
What is the primary function of a shell in a Unix system?
What is the primary function of a shell in a Unix system?
Signup and view all the answers
What is the term for gaining indirect knowledge of communicated data by monitoring signals?
What is the term for gaining indirect knowledge of communicated data by monitoring signals?
Signup and view all the answers
What is the purpose of a smartcard?
What is the purpose of a smartcard?
Signup and view all the answers
What is the term for a fraudulent message sent over SMS, similar to phishing?
What is the term for a fraudulent message sent over SMS, similar to phishing?
Signup and view all the answers
What is the purpose of a sniffer?
What is the purpose of a sniffer?
Signup and view all the answers
What is the primary function of a socket?
What is the primary function of a socket?
Signup and view all the answers
What is the term for a protocol that a proxy server can use to accept requests from client users?
What is the term for a protocol that a proxy server can use to accept requests from client users?
Signup and view all the answers
What is the purpose of a source port?
What is the purpose of a source port?
Signup and view all the answers
What is the term for a cryptographic key that is divided into two or more separate data items?
What is the term for a cryptographic key that is divided into two or more separate data items?
Signup and view all the answers
What is the purpose of a standard ACL on a Cisco router?
What is the purpose of a standard ACL on a Cisco router?
Signup and view all the answers
What is the primary function of a switch in a network?
What is the primary function of a switch in a network?
Signup and view all the answers
What is the purpose of a subnet mask?
What is the purpose of a subnet mask?
Signup and view all the answers
What is the term for methods of hiding the existence of a message or other data?
What is the term for methods of hiding the existence of a message or other data?
Signup and view all the answers
What is the primary function of a stateful inspection firewall?
What is the primary function of a stateful inspection firewall?
Signup and view all the answers
What is the purpose of a static host table?
What is the purpose of a static host table?
Signup and view all the answers
What is the term for a network that provides switched communications service?
What is the term for a network that provides switched communications service?
Signup and view all the answers
What is the primary function of syslog in Unix systems?
What is the primary function of syslog in Unix systems?
Signup and view all the answers
What is the term for a type of cipher that works by encrypting a message a single bit, byte, or computer word at a time?
What is the term for a type of cipher that works by encrypting a message a single bit, byte, or computer word at a time?
Signup and view all the answers
What is the primary function of a subnet in a network?
What is the primary function of a subnet in a network?
Signup and view all the answers
What is the term for a type of attack that sends a host more TCP SYN packets than the protocol implementation can handle?
What is the term for a type of attack that sends a host more TCP SYN packets than the protocol implementation can handle?
Signup and view all the answers
What is a person responsible for enforcement or administration of the security policy that applies to a system?
What is a person responsible for enforcement or administration of the security policy that applies to a system?
Signup and view all the answers
What type of policy is written for a specific system or device?
What type of policy is written for a specific system or device?
Signup and view all the answers
What is the purpose of TCP Wrapper?
What is the purpose of TCP Wrapper?
Signup and view all the answers
What is the term for a potential for violation of security?
What is the term for a potential for violation of security?
Signup and view all the answers
What is a TCP-based, application-layer, Internet Standard protocol for remote login from one host to another?
What is a TCP-based, application-layer, Internet Standard protocol for remote login from one host to another?
Signup and view all the answers
What is the geometric arrangement of a computer system?
What is the geometric arrangement of a computer system?
Signup and view all the answers
What is a token-based device that requires a user to have a token with them when they log in?
What is a token-based device that requires a user to have a token with them when they log in?
Signup and view all the answers
What is the purpose of a threat assessment?
What is the purpose of a threat assessment?
Signup and view all the answers
What is the name of the protocol analyzer for Unix that can monitor network traffic on a wire?
What is the name of the protocol analyzer for Unix that can monitor network traffic on a wire?
Signup and view all the answers
What is the term for a potential to cause harm to a system?
What is the term for a potential to cause harm to a system?
Signup and view all the answers
What is a Virtual Private Network (VPN)?
What is a Virtual Private Network (VPN)?
Signup and view all the answers
What is a characteristic of a virus in computer software?
What is a characteristic of a virus in computer software?
Signup and view all the answers
What is vishing?
What is vishing?
Signup and view all the answers
What is a benefit of using a VPN?
What is a benefit of using a VPN?
Signup and view all the answers
What is the purpose of encryption in a VPN?
What is the purpose of encryption in a VPN?
Signup and view all the answers
What is a common use case for a VPN?
What is a common use case for a VPN?
Signup and view all the answers
What is the primary function of a Voice Firewall?
What is the primary function of a Voice Firewall?
Signup and view all the answers
What is the purpose of a War Dialer?
What is the purpose of a War Dialer?
Signup and view all the answers
What is the primary function of a Windowing System?
What is the primary function of a Windowing System?
Signup and view all the answers
What is the purpose of WHOIS?
What is the purpose of WHOIS?
Signup and view all the answers
What is the main function of a Web Server?
What is the main function of a Web Server?
Signup and view all the answers
What is the primary function of War Chalking?
What is the primary function of War Chalking?
Signup and view all the answers
What is the purpose of Windump?
What is the purpose of Windump?
Signup and view all the answers
What is the primary function of a Worm?
What is the primary function of a Worm?
Signup and view all the answers
What is the primary function of a Zero-Day Attack?
What is the primary function of a Zero-Day Attack?
Signup and view all the answers
What is the primary function of WEP?
What is the primary function of WEP?
Signup and view all the answers