Mile2 Cybersecurity Certifications

Cybersecurity Certifications

Flashcard Set 4

How to use the flashcards:

Click anywhere on the flashcard to reveal the answer.

Click on the arrows at the bottom of the flashcard set to move between flashcards.

Each flashcard set has 5 flashcards.

Define: Logic gate

an elementary building block of a digital circuit. This device is used to implement a boolean function.

Define: Loopback address

a pseudo address that sends outgoing signals back to the same computer for testing.

Define: Monoculture

the case where a large number of users run the same software, and are vulnerable to the same attacks.

Define: Morris worm

was written by a graduate student at cornell university, robert tappan morris, and launched on november 2, 1988 from mit.

Define: Multi homed

any computer host that has multiple ip addresses to connected networks.

Define: Multicast

a method of sending packets of data to a group of receivers in a single transmission.

Define: Multiplexing

a technique by which multiple analog or digital data streams are combined into one signal over a shared medium.

Define: Network mapping

the study of physical connectivity of networks.

Define: Network taps

hardware devices that help in accessing the data flow across a computer network.

____________ is a character that doesn’t have a corresponding character letter to its corresponding ascii code.

Non printable character

____________ refers to the ability of a system to prove that a specific user and only that specific user sent a message and that it hasn’t been modified.

Non repudiation

____________ is also known as anonymous logon. It is a method that allows an anonymous user to retrieve information such as user names and share this over the network, or connect without authentication.

Null session

____________ is a unit of digital information that consists of eight bits.

Octet

____________ is designed in a manner that it is hard to reverse the process, that is, to find a string that hashes to a given value.

One way encryption

____________ is a routing protocol for ip networks and uses a link-state routing algorithm.

One way function

____________ model defines a networking framework to implement protocols in seven layers.

Osi layers

____________ is an iso standard for worldwide communications.

Osi

____________ is defined as the limitation of system operation by excessive burden on the performance capabilities of a system component.

Overload

____________ is a server that acts as an intermediary for requests from clients seeking resources from other servers.

Proxy server

A ____________ is the publicly-disclosed component of a pair of cryptographic keys used for asymmetric cryptography.

Public key

____________ is also known as asymmetric cryptography.

Public key encryption

____________ is a key agreement protocol based on asymmetric cryptography.

Public key forward secrecy pfs

____________ is a set of hardware, software, people, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates and manage public-key encryption.

Public key infrastructure pki

____________ is a network worm.

Qaz

____________ is a device that forwards or transfers data packets across networks.

Router

The ____________ defines a manner for routers to share information on how to route traffic among various networks.

Routing information protocol rip

____________ is where two or more poorly configured routers repeatedly exchange the same data packet over and over.

Routing loop

____________ determine which rpc services are running on a machine.

Rpc scans

____________ targets actions based on rules for entities operating on objects.

Rule set based access control rsbac

In ____________, a user cannot write data to higher or lower classifications levels than their own.

Strong star property

SUPPORT

Please Note:

The support ticket system is for technical questions and post-sale issues.

 

If you have pre-sale questions please use our chat feature or email information@mile2.com .

Privacy Overview
Mile2 Cybersecurity Certifications

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Strictly Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.

If you disable this cookie, we will not be able to save your preferences. This means that every time you visit this website you will need to enable or disable cookies again.