A harmful, destructive or intrusive computer software such as a virus, worm, Trojan or spyware that constantly changes
The fraudulent practice of sending emails ostensibly from a known or trusted sender in order to induce targeted individuals to reveal confidential information
Is an anomaly where a program, while writing data to a buffer, overruns the buffer's boundary and overwrites adjacent memory locations
What is a buffer overflow?
a type of networking device that provides secure creation of VPN connections and delivery of messages between VPN nodes. It is a type of router device, built specifically for creating and managing VPN communication infrastructures.
What is a VPN Concentrator?
CSRF or XSRF
What is Cross Site Request Forgery?
A computer program that records every keystroke made by a computer user, especially in order to gain fraudulent access to passwords and other confidential information.
Searching through trash or garbage looking for useful information that may help an individual get access to a particular network
An attack that is yet unknown to the software maker or to antivirus vendors.
What is Zero Day Attack
A computer networking solution that uses a set of protocols to define and implement a policy that describes how to secure access to network nodes by devices when they initially attempt to access the network.
What is NAC ( Network Access Control)?
XSS
What is Cross Site Scripting?
A piece of software that allows a remote "operator" to control a system as if he has physical access to that system.
Rainbow tables automate the cracking the ___________ process
What is a hash?
A list of permissions attached to an object that specifies which users or system processes are granted access to objects, as well as what operations are allowed on given objects.
What is Access Control List?
RAT
What is Remote Access Trojan?
A set of instructions secretly incorporated into a program so that if a particular condition is satisfied they will be carried out, usually with harmful effects
The fraudulent practice of directing Internet users to a bogus website that mimics the appearance of a legitimate one, in order to obtain personal information such as passwords, account numbers, etc.
Session hijacking uses ______________ to exploit a valid computer session
DAILY TRIPLE!!!!
What is Cookies?
A protection feature built into many firewalls that allow the administrator to tweak the tolerance for unanswered login attacks. It tracks network traffic to identify scenarios that will overwhelm our network through conditions such as SYN, ping, port floods, etc.
DAILY TRIPLE!!!
What is a Flood Guard?
DEP
DAILY TRIPLE!!!!!!!!!!
What is Data Execution Prevention?
A computer virus that contains a variety of mechanisms specifically coded to make its detection and decryption very difficult
A security exploit in which the attacker seeks to compromise a specific group of end users by infecting websites that members of the group are known to visit
A failure in a program to release discarded memory, causing impaired performance or failure
What is a memory leak?
is usually an internal-facing proxy used as a front-end to control and protect access to a server on a private network.
DAILY DOUBLE!!!!!!!
What is a Reverse Proxy?
ESP
DAILY TRIPLE!!!!!!!!!!
What is Encapsulation Security Payload?