Podcast Beta
Questions and Answers
What is the primary purpose of Access Control?
What is an Access Control List (ACL)?
What is the main function of an Access Control Service?
What is the purpose of an Access Matrix?
Signup and view all the answers
What is ACK Piggybacking?
Signup and view all the answers
What is the primary function of Activity Monitors?
Signup and view all the answers
What is the primary characteristic of a circuit-switched network?
Signup and view all the answers
What is the main purpose of a cloud computing system?
Signup and view all the answers
Which type of disaster recovery site is the most expensive option?
Signup and view all the answers
What is the term for the unauthorized disclosure of information?
Signup and view all the answers
What is the purpose of a Computer Emergency Response Team (CERT)?
Signup and view all the answers
What is the term for the process of exchanging data between an HTTP server and a client?
Signup and view all the answers
What is the primary goal of a cost-benefit analysis in the context of security?
Signup and view all the answers
What is the term for the threat action that undesirably alters system operation?
Signup and view all the answers
What is the purpose of a client in a network?
Signup and view all the answers
What is the term for the process of detecting and responding to security incidents?
Signup and view all the answers
What is the primary purpose of a Distance Vector?
Signup and view all the answers
What is Domain Hijacking?
Signup and view all the answers
What is the purpose of a Domain Name System (DNS)?
Signup and view all the answers
What is Due Care?
Signup and view all the answers
What is the purpose of DumpSec?
Signup and view all the answers
What is the primary purpose of Dynamic Routing Protocols?
Signup and view all the answers
What is Eavesdropping?
Signup and view all the answers
What is the purpose of an Echo Request?
Signup and view all the answers
What is the primary purpose of Egress Filtering?
Signup and view all the answers
What is a Domain in Windows NT and Windows 2000?
Signup and view all the answers
What is the primary purpose of a firewall?
Signup and view all the answers
What is the goal of flooding an attack?
Signup and view all the answers
What is a forest in the context of Active Directory?
Signup and view all the answers
What is the purpose of a fork bomb?
Signup and view all the answers
What is the purpose of fingerprinting?
Signup and view all the answers
Which protocol is used to exchange routing information for the Internet and is the protocol used between Internet service providers (ISP)?
Signup and view all the answers
What is the process of simultaneously sending the same message to multiple recipients?
Signup and view all the answers
What is a standard code of practice that provides guidance on how to secure an information system?
Signup and view all the answers
What is a unit of data transmitted over an ATM network?
Signup and view all the answers
What is a cryptographic algorithm for encryption and decryption?
Signup and view all the answers
What is a client computer program that can retrieve and display information from servers on the World Wide Web?
Signup and view all the answers
What is the encrypted form of the message being sent?
Signup and view all the answers
What is a business plan that outlines emergency response, backup operations, and post-disaster recovery steps?
Signup and view all the answers
What is a technique used to trick a browser to run cached Java code from the local disk, instead of the internet zone, so it runs with less restrictive permissions?
Signup and view all the answers
What is a value that is computed by a function that is dependent on the contents of a data object and is stored or transmitted together with the object, for the purpose of detecting changes in the data?
Signup and view all the answers
What is the primary function of the Address Resolution Protocol (ARP)?
Signup and view all the answers
What is the main characteristic of Asymmetric Cryptography?
Signup and view all the answers
What is the purpose of Auditing in the context of information security?
Signup and view all the answers
What is the definition of Availability in the context of information security?
Signup and view all the answers
What is the purpose of a Backdoor in the context of information security?
Signup and view all the answers
What is the definition of Bandwidth in the context of information security?
Signup and view all the answers
What is the purpose of a Banner in the context of information security?
Signup and view all the answers
What is the definition of Biometrics in the context of information security?
Signup and view all the answers
What is the purpose of a Boot Record Infector?
Signup and view all the answers
What is the definition of Basic Authentication in the context of information security?
Signup and view all the answers
What is the primary purpose of an Intrusion Prevention System (IPS)?
Signup and view all the answers
What is the purpose of a covert channel?
Signup and view all the answers
What is crimineware?
Signup and view all the answers
What is the purpose of a cron job?
Signup and view all the answers
What is the purpose of a crossover cable?
Signup and view all the answers
What is cryptanalysis?
Signup and view all the answers
What is the purpose of a cyclic redundancy check (CRC)?
Signup and view all the answers
What is a daemon?
Signup and view all the answers
What is data aggregation?
Signup and view all the answers
What is the purpose of a data custodian?
Signup and view all the answers
What is the primary characteristic of a connectionless protocol?
Signup and view all the answers
What is the 'Day Zero' in the context of computer security?
Signup and view all the answers
What is the process of stripping off one layer's headers and passing the rest of the packet up to the next higher layer on the protocol stack?
Signup and view all the answers
What is the process of transforming an encrypted message into its original plaintext?
Signup and view all the answers
What is the method of modifying the content of a website in such a way that it becomes 'vandalized' or embarrassing to the website owner?
Signup and view all the answers
What is the approach of using multiple layers of security to guard against failure of a single security component?
Signup and view all the answers
What is a network area that sits between an organization's internal network and an external network, usually the Internet?
Signup and view all the answers
What is an attack that tries all of the phrases or words in a dictionary, trying to crack a password or key?
Signup and view all the answers
What is a key agreement algorithm published in 1976 by Whitfield Diffie and Martin Hellman?
Signup and view all the answers
What is an electronic 'credit card' that establishes your credentials when doing business or other transactions on the Web?
Signup and view all the answers
What is the purpose of Emanations Analysis?
Signup and view all the answers
What is the main characteristic of an Ephemeral Port?
Signup and view all the answers
What is the purpose of Escrow Passwords?
Signup and view all the answers
What is the primary function of Ethernet?
Signup and view all the answers
What is the purpose of an Exponential Backoff Algorithm?
Signup and view all the answers
What is the main characteristic of an Extended ACL?
Signup and view all the answers
What is the primary function of the File Transfer Protocol (FTP)?
Signup and view all the answers
What is the main purpose of a Filter in a network?
Signup and view all the answers
What is the primary function of a Finger protocol?
Signup and view all the answers
What is an Event in a system or network?
Signup and view all the answers
What is the primary goal of flooding an attack?
Signup and view all the answers
What is the purpose of a forward lookup?
Signup and view all the answers
What is the result of a fork bomb attack?
Signup and view all the answers
What is the purpose of form-based authentication?
Signup and view all the answers
What is the fragment offset field used for?
Signup and view all the answers
What is the purpose of a forward proxy?
Signup and view all the answers
What is the process of storing a data file in several chunks or fragments rather than in a single contiguous sequence of bits?
Signup and view all the answers
What is a network point that acts as an entrance to another network?
Signup and view all the answers
What is a type of duplex communications channel that carries data in both directions at once?
Signup and view all the answers
What is a Unix-like operating system that comes with source code that can be copied, modified, and redistributed?
Signup and view all the answers
What is an algorithm that computes a value based on a data object, thereby mapping the data object to a smaller data object?
Signup and view all the answers
What is a type of attack that seizes control of a previously established communication association?
Signup and view all the answers
What is a server name with a hostname followed by the full domain name?
Signup and view all the answers
What is a type of file sharing utility that acts as a server and client simultaneously?
Signup and view all the answers
What is the process of identifying and fixing vulnerabilities on a system?
Signup and view all the answers
What is a type of intrusion detection system that uses information from the operating system audit records to watch all operations occurring on the host?
Signup and view all the answers
What is the primary function of an HTTP Proxy?
Signup and view all the answers
What is the purpose of a Hybrid Attack?
Signup and view all the answers
What is the primary function of Incident Handling?
Signup and view all the answers
What is the purpose of Ingress Filtering?
Signup and view all the answers
What is the primary function of the Internet Control Message Protocol (ICMP)?
Signup and view all the answers
What is the primary function of the Internet Message Access Protocol (IMAP)?
Signup and view all the answers
What is the purpose of Integrity in the context of information security?
Signup and view all the answers
What is the primary function of a Hub?
Signup and view all the answers
What is the purpose of a Hybrid Encryption?
Signup and view all the answers
What is the purpose of Information Warfare?
Signup and view all the answers
What is the purpose of L2TP?
Signup and view all the answers
What is the principle of allowing users the least amount of permissions necessary to perform their intended function?
Signup and view all the answers
What is a type of attack in which one system entity illegitimately poses as another entity?
Signup and view all the answers
What is the process of selectively removing log entries from a system log to hide a compromise?
Signup and view all the answers
What is a software protocol for enabling anyone to locate organizations and individuals in a network?
Signup and view all the answers
What is a type of cyber attack in which the attacker intercepts and relays messages between two parties?
Signup and view all the answers
What is a one-way cryptographic hash function?
Signup and view all the answers
What is the term for the ability to attack or defend within an Internet environment?
Signup and view all the answers
What is the purpose of NAT?
Signup and view all the answers
What is a type of program that executes when a certain predefined event occurs?
Signup and view all the answers
What is the primary function of IP Forwarding?
Signup and view all the answers
What is the purpose of an Intranet?
Signup and view all the answers
What is Intrusion Detection?
Signup and view all the answers
What is an IP Address?
Signup and view all the answers
What is IP Spoofing?
Signup and view all the answers
What is the main purpose of NAT in a home or small business network?
Signup and view all the answers
What is ISO?
Signup and view all the answers
What is a Netmask?
Signup and view all the answers
What is an Issue-Specific Policy?
Signup and view all the answers
What is Network-Based IDS?
Signup and view all the answers
What is Jitter?
Signup and view all the answers
What is the purpose of Non-Repudiation?
Signup and view all the answers
What is a Jump Bag?
Signup and view all the answers
What is an Octet?
Signup and view all the answers
What is the primary function of the Kernel?
Signup and view all the answers
What is One-Way Encryption?
Signup and view all the answers
What is the purpose of a Null Session?
Signup and view all the answers
What is Network Mapping?
Signup and view all the answers
What is Network Taps?
Signup and view all the answers
What is Non-Printable Character?
Signup and view all the answers
What is the primary function of the network layer in the OSI model?
Signup and view all the answers
What is the purpose of the OSI model?
Signup and view all the answers
What is the main idea behind the OSI model?
Signup and view all the answers
What is the application layer responsible for in the OSI model?
Signup and view all the answers
What is the presentation layer responsible for in the OSI model?
Signup and view all the answers
What is the transport layer responsible for in the OSI model?
Signup and view all the answers
What is the session layer responsible for in the OSI model?
Signup and view all the answers
What is the primary function of OSPF?
Signup and view all the answers
What is the characteristic of a one-way function?
Signup and view all the answers
What is the advantage of the OSI model?
Signup and view all the answers
What is the primary function of the data-link layer?
Signup and view all the answers
What is the main purpose of a packet in a packet-switched network?
Signup and view all the answers
What is the goal of password sniffing?
Signup and view all the answers
What is pharming?
Signup and view all the answers
What is the primary function of a personal firewall?
Signup and view all the answers
What is the purpose of a patch?
Signup and view all the answers
What is the term for the actual application data a packet contains?
Signup and view all the answers
What is the purpose of penetration testing?
Signup and view all the answers
What is phishing?
Signup and view all the answers
What is the purpose of a ping scan?
Signup and view all the answers
What is the main purpose of Point-to-Point Tunneling Protocol (PPTP)?
Signup and view all the answers
What is the effect of poison reverse in routing updates?
Signup and view all the answers
What is polyinstantiation?
Signup and view all the answers
What is the purpose of a port scan?
Signup and view all the answers
What is possession in the context of information security?
Signup and view all the answers
What is polymorphism in the context of malicious software?
Signup and view all the answers
What is the primary function of a Post Office Protocol, Version 3 (POP3)?
Signup and view all the answers
What is the purpose of a preamble in network communications?
Signup and view all the answers
What is the term for the address ranges set aside for use by private or non-Internet connected networks?
Signup and view all the answers
What type of malware attaches itself to existing program files?
Signup and view all the answers
What is the purpose of a Promiscuous Mode?
Signup and view all the answers
What is the definition of a Protocol?
Signup and view all the answers
What is the primary purpose of Public-Key Forward Secrecy?
Signup and view all the answers
What is the primary purpose of a Ransomware?
Signup and view all the answers
What is the purpose of a Public Key Infrastructure (PKI)?
Signup and view all the answers
What is the primary function of a Proxy Server?
Signup and view all the answers
What is the primary purpose of a Reconnaissance?
Signup and view all the answers
What is the primary purpose of Reflexive ACLs?
Signup and view all the answers
What is the term for a program that executes when a certain predefined event occurs?
Signup and view all the answers
What is the purpose of a Private Addressing?
Signup and view all the answers
What is the primary purpose of Radiation Monitoring?
Signup and view all the answers
What is the primary purpose of a Response?
Signup and view all the answers
What is the primary purpose of Reverse Engineering?
Signup and view all the answers
What is the primary purpose of Risk Assessment?
Signup and view all the answers
What is the primary purpose of RARP?
Signup and view all the answers
What is the primary purpose of RSA?
Signup and view all the answers
What is the purpose of Role-Based Access Control?
Signup and view all the answers
What is a Router used for?
Signup and view all the answers
What is a security mechanism that uses a cryptographic hash function?
Signup and view all the answers
What is the purpose of Secure Electronic Transactions (SET)?
Signup and view all the answers
What is the purpose of a Server?
Signup and view all the answers
What is a Segment?
Signup and view all the answers
What is Sensitive Information?
Signup and view all the answers
What is a Session?
Signup and view all the answers
What is a Session Key?
Signup and view all the answers
What is a Share?
Signup and view all the answers
What is the primary function of the Transmission Control Protocol (TCP)?
Signup and view all the answers
What is the purpose of Trunking in computer networks?
Signup and view all the answers
What is the primary function of the User Datagram Protocol (UDP)?
Signup and view all the answers
What is the purpose of a Tunnel in computer networks?
Signup and view all the answers
What is the primary function of the Uniform Resource Locator (URL)?
Signup and view all the answers
What is the purpose of Trust in computer networks?
Signup and view all the answers
What is the primary function of the Transport Layer Security (TLS) protocol?
Signup and view all the answers
What is the purpose of a Trojan Horse in computer networks?
Signup and view all the answers
What is the primary function of the Traceroute tool?
Signup and view all the answers
What is the purpose of Unicast in computer networks?
Signup and view all the answers
What is the primary function of a shell in a Unix system?
Signup and view all the answers
What is the term for gaining indirect knowledge of communicated data by monitoring signals?
Signup and view all the answers
What is the purpose of a smartcard?
Signup and view all the answers
What is the term for a fraudulent message sent over SMS, similar to phishing?
Signup and view all the answers
What is the purpose of a sniffer?
Signup and view all the answers
What is the primary function of a socket?
Signup and view all the answers
What is the term for a protocol that a proxy server can use to accept requests from client users?
Signup and view all the answers
What is the purpose of a source port?
Signup and view all the answers
What is the term for a cryptographic key that is divided into two or more separate data items?
Signup and view all the answers
What is the purpose of a standard ACL on a Cisco router?
Signup and view all the answers
What is the primary function of a switch in a network?
Signup and view all the answers
What is the purpose of a subnet mask?
Signup and view all the answers
What is the term for methods of hiding the existence of a message or other data?
Signup and view all the answers
What is the primary function of a stateful inspection firewall?
Signup and view all the answers
What is the purpose of a static host table?
Signup and view all the answers
What is the term for a network that provides switched communications service?
Signup and view all the answers
What is the primary function of syslog in Unix systems?
Signup and view all the answers
What is the term for a type of cipher that works by encrypting a message a single bit, byte, or computer word at a time?
Signup and view all the answers
What is the primary function of a subnet in a network?
Signup and view all the answers
What is the term for a type of attack that sends a host more TCP SYN packets than the protocol implementation can handle?
Signup and view all the answers
What is a person responsible for enforcement or administration of the security policy that applies to a system?
Signup and view all the answers
What type of policy is written for a specific system or device?
Signup and view all the answers
What is the purpose of TCP Wrapper?
Signup and view all the answers
What is the term for a potential for violation of security?
Signup and view all the answers
What is a TCP-based, application-layer, Internet Standard protocol for remote login from one host to another?
Signup and view all the answers
What is the geometric arrangement of a computer system?
Signup and view all the answers
What is a token-based device that requires a user to have a token with them when they log in?
Signup and view all the answers
What is the purpose of a threat assessment?
Signup and view all the answers
What is the name of the protocol analyzer for Unix that can monitor network traffic on a wire?
Signup and view all the answers
What is the term for a potential to cause harm to a system?
Signup and view all the answers
What is a Virtual Private Network (VPN)?
Signup and view all the answers
What is a characteristic of a virus in computer software?
Signup and view all the answers
What is vishing?
Signup and view all the answers
What is a benefit of using a VPN?
Signup and view all the answers
What is the purpose of encryption in a VPN?
Signup and view all the answers
What is a common use case for a VPN?
Signup and view all the answers
What is the primary function of a Voice Firewall?
Signup and view all the answers
What is the purpose of a War Dialer?
Signup and view all the answers
What is the primary function of a Windowing System?
Signup and view all the answers
What is the purpose of WHOIS?
Signup and view all the answers
What is the main function of a Web Server?
Signup and view all the answers
What is the primary function of War Chalking?
Signup and view all the answers
What is the purpose of Windump?
Signup and view all the answers
What is the primary function of a Worm?
Signup and view all the answers
What is the primary function of a Zero-Day Attack?
Signup and view all the answers
What is the primary function of WEP?
Signup and view all the answers