CompTIA Security + Ch 7

Card Set Information

CompTIA Security + Ch 7
2012-06-14 13:53:36

Show Answers:

  1. Default Account
    An account installed by default on an OS or device with a default set of credentials.
  2. Privilege Escalation
    The act of exploiting a bug in software or firmware to gain access to resources that are protected from users.`
  3. Backdoors
    Built into programs to bypass authentication or other security protocols.
  4. Crosstalk
    When a signal from one copper wire creates an undesired effect on another wire; the signal "bleeds" over from one wire to another.
  5. Data Emanation
    The electomagnetic field generated by a network cable or networked device, which can be used to eavesdrop on conversations or steal data.
  6. Vampire Tap
    A device used to add computer to a 10BASE5 network. It pierces the copper conductor of a coaxial cable and can also be used for malicious purposes.
  7. WireTapping
    Tapping into a network cable in an attempt to eavesdrop on a conversation or steal data.
  8. Chromatic Dispersion
    The refraction of light as in a rainbow. If light is refracted in such a manner on fiber optic cables, the signal cannot be read by the receiver.
  9. Electromagnetic Interference (EMI)
    A disturbance that can affect elecrtial circuits, devices, and cables due to electromagnetic conduction or radiation.
  10. Radio Frequency Interference (RFI)
    Interference that can come from AM/FM transmissions and cell towers.
    Refers to the ivestigations of conducted emissions from electrical and mechanical devices, which could be compromising to an organization.
  12. Faraday Cage
    An enclosure formed by conducting material or by mesh of such material; it blocks out external static electic fields and can stop emanations from cell phones and other devices within the cage from leaking out.
  13. Butt Set (or lineman's handset)
    A device that loks similar to a phone but has alligator clips that can connect to the various terminals used by phone equipment, enabling a person to listen in to a conversation.
  14. Service Set Identifier (SSID)
    The name of a wireless access point (or network) to which network clients will connect.
  15. Wired Equivalent Privacy (WEP)
    A deprecated wireless network security standard, less secure than WPA.
  16. Wi-Fi Protected Access (WPA)
    A security protocol created by the Wi-Fi Alliance to secure wireless computer networks, more secure than WEP.
  17. Advanced Encryption Standard (AES)
    An encryption standard used with WPA and WPA 2. The successor to DES/3DES and is another symmetic key encryption standard composed of three different block ciphers: AES-128, AES-192, and AES-256.
  18. Temporal Key Integrity Protocol (TKIP)
    An algorithm used to secure wireless networks; replacement for WEP.
  19. MAC Filtering
    A methos used to filter out which computers can access the wireless network based on a list of authorized MAC addresses.
  20. AP isolation
    Each client connected to the AP will not be able to communicate with each other, but they can still access the Internet.
  21. Wardriving
    The act of searching for wireless networks by driving around with a strong wireless antenna.
  22. IV attack
    A type of  related-key attack, which is when an attacker observes the operation of a cipher using several different keys, and finding a mathematical relationship between them, allowing them to decipher data.
  23. Bluejacking
    The sending of unsolicited messages to Bluetooth enabled devices.
  24. Bluesnarfing
    The unauthorized access to information from a Bluetooth enabled device.