Upgrade to remove ads
Information Assurance Final
Terms in this set (45)
_____ is the process of establishing a system's security state.
Securing and preparing a system for the production environment is called ______.
The basic software on a computer that handles input and output is called the ____.
The Simple Network Management Protocol (SNMP) uses two kinds of strings: ______ and _____. One allows you to "read-only" access and the other may allow you to change configuration information on a compatible remote device.
A(n) _____ is a bundled set of software updates, fixes, and additional functions contained in a self-installing package.
process identifier (PID)
In most UNIX operating systems, each running program is given a unique number called a(n) _______.
When a user or process supplies more data than was expected, a(n) ______ may occur.
_____ are used to describe the state of init and what system services are operating in UNIX systems.
A(n) _____ is a collection of security settings that can be applied to a system.
Changing a source IP address for malicious purpose is an example of ______.
A(n) _____ is a way back into a machine via an unauthorized channel of access.
A malicious proxy could create a(n) _____ attack.
Abusing the TCP handshake in an effort to overuse server resources can be done using a(n) ______.
The main TCP/IP defense against a man-in-the-middle attack is the use of a(n) _______.
Holding a DNS name without paying is called _______.
When a keylogger is installed as malware, it is referred to as ______.
Denial of Service (DoS) attack
Rendering a resource useless is call a(n) _______.
An attack designed to match an user's password as opposed to a specific user's password is an example of a(n) _________.
A NIC can be set in promiscuous mode to enable _______.
unsolicited commercial email
Spam is the popular term for _______.
A(n) ______ is a malicious code program that automates the infection process.
A large source of spam is zombie computers that are part of a(n) ________.
A program that looks like a normal application but contains malicious code is a(n) _______.
Realtime Blackhole List (RBL)
A(n) _____ is a compilation of servers that are blocked because they have been known to send spam.
______ is one of the most popular chat programs.
A(n) _______ is a malicious code program that needs user intervention to spread.
A(n) _______ is a false email that tells a compelling story, and typically prompts the user to forward it to other users.
________ can have the same virus risks as email.
Simple Mail Transfer Protocol (SMTP)
The most prevalent protocol that email is sent by is _____.
______ are small text files used to enhance web surfing by creating a link between pages visited on a web site.
_____ are small application programs that increase a browser's ability to handle new data types and add new functionality.
An application level protocol that operates over a wide range of lower-level protocols and is used to transfer files is _____.
_____ files have the .ocx extension to identify them.
_____ is the standard for directory services.
Adding a digital signature and a digital certificate to a program file to demonstrate file integrity and authenticity is _____.
_____ is a system that uses digital signatures and allows Windows users to determine who produced a specific piece of code and whether or not the code has been altered.
The _____ is a linear software engineering model with no repeating steps.
_____ cause an application to malfunction due to a misrepresented name for a resource.
Using a series of malformed input to test for conditions such as buffer overflows is called _____.
Modifying a SQL statement through false input to a function is an example of _____.
Using an administrator-level account for all functions is a violation of the principle of _____.
The ____ is the first opportunity to address security functionality during a project.
The banning of ____ helps improve code quality by using safer library calls.
A(n) ______ is a defined set of validated inputs and outputs used to test a module for correct functionality.
A number that is suitable for an encryption function is called ______.
THIS SET IS OFTEN IN FOLDERS WITH...
Principles of Computer Security
Info Sec - Ch 15
test 2 practise
Principles of Computer security chapter 1-6, 9-10,…
YOU MIGHT ALSO LIKE...
Information Security Management Chapter 6
Midterm Chapter 6
LIS 4774 ch6
Chapter 10 Buffer Overflow
OTHER SETS BY THIS CREATOR
Java - Final
Java - Exam 2
Telecom - Final
OTHER QUIZLET SETS
ch 16 file system
OS Hardening and Virtualization
IS chapter 7