Close

Flashcard Set 3

How to use the flashcards:

Click anywhere on the flashcard to reveal the answer.

Click on the arrows at the bottom of the flashcard set to move between flashcards.

Each flashcard set has 5 flashcards.

Define: Exploitable channel

a channel that allows the violation of the security policy governing an information system and is usable or detectable by subjects external to the trusted computing base.

Define: External network

a network not controlled by the organization.

Define: External security testing

security testing conducted from outside the organization’s security perimeter.

Define: Forensics

the practice of gathering, retaining, and analyzing computer-related data for investigative purposes in a manner that maintains the integrity of the data.

Define: Forward cipher

one of the two functions of the block cipher algorithm that is determined by the choice of a cryptographic key.

Define: Freeware

an application, program, or software available for use at no cost.

Define: Full disk encryption fde

the process of encrypting all the data on the hard disk drive used to boot a computer, including the computer’s operating system, and permitting access to the data only after successful authentication with the full disk encryption product.

Define: Graduated security

a security system that provides several levels (e.g., low, moderate, high) of protection based on threats, risks, available technology, support services, time, human concerns, and economics.

Define: Group authenticator

used sometimes in addition to a sign-on authenticator, to allow access to specific data or functions that may be shared by all members of a particular group.

Define: Guard system

a mechanism limiting the exchange of information between information systems or subsystems.

Define: Guessing entropy

a measure of the difficulty that an attacker has to guess the average password used in a system.

Define: Guideline

a general rule or a piece of advice required to follow in order to accomplish the set goals of an organization.

Define: Hybrid encryption

a method of encryption that combines two or more encryption algorithms or systems.

Define: Hybrid security control

a security control that is implemented in an information system in part as a common control and in part as a system-specific control.

Define: Hyperlink

could be a word, a phrase, or an image that refers to data or related information that the user can directly follow either by clicking or by hovering.

Define: Hypertext markup language html

a set of markup symbols or codes that are inserted in a file intended for display on a world wide web (www) browser page.

Define: Hypertext transfer protocol http

This protocol defines how messages are formatted and transmitted on the internet and what actions web servers and browsers should take in response to various commands.

Define: Ip flood

a type of denial of service attack where the victim or system is flooded with information that uses up all the available bandwidth and prevents legitimate users from access.

Define: Ip spoofing

It is a hijacking technique where a hacker impersonates as a trusted host to conceal his identity, spoof a website, hijack browsers, or gain access to a network.

Define: Ip forwarding

It is a process used to determine using which path a packet or datagram can be sent.

Define: Iso

an international standard-setting body that is composed of voluntary representatives from various national standards organizations.

Define: Issue specific policy

is intended to address specific needs within an organisation, such as a password policy.

Define: Itu t

one of the three sectors of the international telecommunication union (itu).

Define: Jitter

any deviation in, or displacement of, the signal pulses in a high-frequency digital signal.

Define: Jump bag

a container that has all the items necessary to respond to an incident inside to help mitigate the effects of delayed reactions.

Define: Kerberos

a computer network authentication protocol and is ticket-based allowing nodes to communicate over a non-secure.

Define: Kernel

an essential center of a computer operating system, the core that provides basic services for all other parts of the operating system.

Define: Loadable kernel modules

an object file that contains code to extend the running kernel or the base kernel of an operating system.

Define: Log clipping

the selective removal of log entries from a system log to hide a compromise.

Define: Logic bombs

a piece of code that is deliberately inserted into a system to trigger a malicious program.

SUPPORT

Please Note:

The support ticket system is for technical questions and post-sale issues.

 

If you have pre-sale questions please use our chat feature or email information@mile2.com .

Cybersecurity Certifications for Today's INFOSEC Careers

Mile2 Cybersecurity Certifications is a world-leader in providing accredited education, training, and certifications for INFOSEC professionals. We strive to deliver the best course ware, the strongest Cyber Range, and the most user-friendly exam system in the market.

 

Our training courses follow our role-based Certification Roadmap. Plus, many of our classes include hands-on skill development in our Cyber Range.  We train students in penetration testing,disaster recovery, incident handling, and network forensics.  Additionally, our Information Assurance training certification meets military, government, private sector and institutional specifications.  

 

Accreditations

We've developed training for...

Canada Army Navy Airforce

The Canadian Department of National Defense

USAF

The United States Air Force

Defense Logistics Agency

A United States Counterintelligence Agency

Texas Workforce Commission

Texas Workforce Commission