Mile2 Cybersecurity Certifications

Flashcard Set 4

How to use the flashcards:

Click anywhere on the flashcard to reveal the answer.

Click on the arrows at the bottom of the flashcard set to move between flashcards.

Each flashcard set has 5 flashcards.

Define: Logic gate

an elementary building block of a digital circuit. This device is used to implement a boolean function.

Define: Loopback address

a pseudo address that sends outgoing signals back to the same computer for testing.

Define: Monoculture

the case where a large number of users run the same software, and are vulnerable to the same attacks.

Define: Morris worm

was written by a graduate student at cornell university, robert tappan morris, and launched on november 2, 1988 from mit.

Define: Multi homed

any computer host that has multiple ip addresses to connected networks.

Define: Multicast

a method of sending packets of data to a group of receivers in a single transmission.

Define: Multiplexing

a technique by which multiple analog or digital data streams are combined into one signal over a shared medium.

Define: Network mapping

the study of physical connectivity of networks.

Define: Network taps

hardware devices that help in accessing the data flow across a computer network.

____________ is a character that doesn’t have a corresponding character letter to its corresponding ascii code.

Non printable character

____________ refers to the ability of a system to prove that a specific user and only that specific user sent a message and that it hasn’t been modified.

Non repudiation

____________ is also known as anonymous logon. It is a method that allows an anonymous user to retrieve information such as user names and share this over the network, or connect without authentication.

Null session

____________ is a unit of digital information that consists of eight bits.

Octet

____________ is designed in a manner that it is hard to reverse the process, that is, to find a string that hashes to a given value.

One way encryption

____________ is a routing protocol for ip networks and uses a link-state routing algorithm.

One way function

____________ model defines a networking framework to implement protocols in seven layers.

Osi layers

____________ is an iso standard for worldwide communications.

Osi

____________ is defined as the limitation of system operation by excessive burden on the performance capabilities of a system component.

Overload

____________ is a server that acts as an intermediary for requests from clients seeking resources from other servers.

Proxy server

A ____________ is the publicly-disclosed component of a pair of cryptographic keys used for asymmetric cryptography.

Public key

____________ is also known as asymmetric cryptography.

Public key encryption

____________ is a key agreement protocol based on asymmetric cryptography.

Public key forward secrecy pfs

____________ is a set of hardware, software, people, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates and manage public-key encryption.

Public key infrastructure pki

____________ is a network worm.

Qaz

____________ is a device that forwards or transfers data packets across networks.

Router

The ____________ defines a manner for routers to share information on how to route traffic among various networks.

Routing information protocol rip

____________ is where two or more poorly configured routers repeatedly exchange the same data packet over and over.

Routing loop

____________ determine which rpc services are running on a machine.

Rpc scans

____________ targets actions based on rules for entities operating on objects.

Rule set based access control rsbac

In ____________, a user cannot write data to higher or lower classifications levels than their own.

Strong star property

SUPPORT

Please Note:

The support ticket system is for technical questions and post-sale issues.

 

If you have pre-sale questions please use our chat feature or email information@mile2.com .