Flashcard Set 4
How to use the flashcards:
Click anywhere on the flashcard to reveal the answer.
Click on the arrows at the bottom of the flashcard set to move between flashcards.
Each flashcard set has 5 flashcards.
Define: Logic gate
an elementary building block of a digital circuit. This device is used to implement a boolean function.
Define: Loopback address
a pseudo address that sends outgoing signals back to the same computer for testing.
Define: Monoculture
the case where a large number of users run the same software, and are vulnerable to the same attacks.
Define: Morris worm
was written by a graduate student at cornell university, robert tappan morris, and launched on november 2, 1988 from mit.
Define: Multi homed
any computer host that has multiple ip addresses to connected networks.
Define: Multicast
a method of sending packets of data to a group of receivers in a single transmission.
Define: Multiplexing
a technique by which multiple analog or digital data streams are combined into one signal over a shared medium.
Define: Network mapping
the study of physical connectivity of networks.
Define: Network taps
hardware devices that help in accessing the data flow across a computer network.
____________ is a character that doesn’t have a corresponding character letter to its corresponding ascii code.
Non printable character
____________ refers to the ability of a system to prove that a specific user and only that specific user sent a message and that it hasn’t been modified.
Non repudiation
____________ is also known as anonymous logon. It is a method that allows an anonymous user to retrieve information such as user names and share this over the network, or connect without authentication.
Null session
____________ is a unit of digital information that consists of eight bits.
Octet
____________ is designed in a manner that it is hard to reverse the process, that is, to find a string that hashes to a given value.
One way encryption
____________ is a routing protocol for ip networks and uses a link-state routing algorithm.
One way function
____________ model defines a networking framework to implement protocols in seven layers.
Osi layers
____________ is an iso standard for worldwide communications.
Osi
____________ is defined as the limitation of system operation by excessive burden on the performance capabilities of a system component.
Overload
____________ is a server that acts as an intermediary for requests from clients seeking resources from other servers.
Proxy server
A ____________ is the publicly-disclosed component of a pair of cryptographic keys used for asymmetric cryptography.
Public key
____________ is also known as asymmetric cryptography.
Public key encryption
____________ is a key agreement protocol based on asymmetric cryptography.
Public key forward secrecy pfs
____________ is a set of hardware, software, people, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates and manage public-key encryption.
Public key infrastructure pki
____________ is a network worm.
Qaz
____________ is a device that forwards or transfers data packets across networks.
Router
The ____________ defines a manner for routers to share information on how to route traffic among various networks.
Routing information protocol rip
____________ is where two or more poorly configured routers repeatedly exchange the same data packet over and over.
Routing loop
____________ determine which rpc services are running on a machine.
Rpc scans
____________ targets actions based on rules for entities operating on objects.
Rule set based access control rsbac
In ____________, a user cannot write data to higher or lower classifications levels than their own.
Strong star property