NW203 Test3 Ch11-12 terms

  1. 802.1x
    A wireless security standard method for authenticating users.
  2. Account lockout policies
    Policies controlling account lockout configuration parameters.
  3. Active Directory Users and Computers
    A Windows Active Directory utility used to manage organizational units, users, groups, computers, and other domain objects.
  4. AES
    Advanced Encryption Standard (AES) A symmetric-key encryption standard adopted by the U.S. government using three block ciphers, each of which consists of a 128-bit block size.
  5. Adware
    Software that makes a computer more easily locatable by and more susceptible to pop-up and other online ads.
  6. Asymmetric keys
    The public and private keys used in public key encryption.
  7. Authentication credentials
    Information or a security device used to authenticate a user’s access to a network, most commonly based on user name and password.
  8. Authenticator
    A term that refers to a WAP during 802.1x authentication.
  9. Availability
    A term that refers to providing continuous operation of an organization’s hardware and software so that there is no interruption of service.
  10. Biometric scan
    A security scan based on a user’s identifiable physical characteristic.
  11. Bit strength
    A measure of encryption strength based on the number of bits in a key.
  12. Business continuity planning
    Ensuring availability and integrity; keeping the business running when disruptions occur.
  13. Confidentiality
    A term that refers to protection of organization data from unauthorized disclosure.
  14. DES
    Data Encryption Standard (DES) A private key encryption system originally developed by IBM.
  15. DDoS agent
    Software placed on a computer that enables it to be used as a message source in a DDoS attack.
  16. DDoS handler
    Software used during a DDoS attack to control the agents.
  17. DMZ
    Demilitarized zone (DMZ) A protected area of a network between the internal network and the Internet that is bounded by one or two firewalls. Also known as a perimeter network.
  18. DoS
    Denial of service (DoS) An attack that attempts to disrupt a network or its servers by flooding them with packets.
  19. Disruption
    Interruptions of or reductions in network service.
  20. DDoS
    Distributed denial of service (DDoS) attack A DoS attack in which the attacker controls multiple attacking systems.
  21. Domain account
    A Windows Active Directory user account used for domain authentication and resource access authorization.
  22. Encryption algorithm
    Values used for data encryption. Also known as an encryption formula.
  23. Encryption key
    The table or formula that defines which character in the data translates to which encoded character.
  24. Firewall
    A network security device that filters traffic into and out of a network or subnet.
  25. Hacker
    An expert in problem solving with a computer who sometimes gains illegal access to and sometimes tampers with information in a computer system.
  26. Integrity
    The assurance that data has not been altered or destroyed.
  27. ICMP
    Internet Control Message Protocol (ICMP) A management and troubleshooting protocol that provides support through error and control messages.
  28. IPSec
    Internet Protocol Security (IPSec) A security protocol used for VPN security.
  29. IP spoofing
    The process of sending packets with a fake source address.
  30. L2TP
    Layer 2 Tunneling Protocol (L2TP) A security protocol used for VPN security.
  31. Local account
    A user account used by a local computer for authorization and resource access authentication.
  32. Malware
    Malicious or annoying unwanted software.
  33. Mission-critical application
    An information system that is vital to an organization.
  34. Perimeter network
    See demilitarized zone (DMZ).
  35. Ping of Death
    A type of DoS attack that sends oversized ping packets to the target computer.
  36. Polymorphic virus
    A type of encrypted virus that includes a scrambled virus body, a decryption routine that first gains control of the computer, and a mutation engine randomizing decryption routines that change each time a virus infects a new program.
  37. Private key
    An encryption key known to the receiver only in public key encryption.
  38. Public key
    An encryption key used by the sender to encrypt data and based on the receiver’s private key.
  39. Public key encryption
    Encryption based on separate sender and receiver keys.
  40. RSA
    Rivest, Shamir, and Adleman (RSA) A public key encryption algorithm.
  41. Rootkit
    A program that can hide itself, along with other programs, files, and processes, from the operating system, antivirus software, and other security software.
  42. Screened subnet
    A subnet that is isolated from the rest of the network by a firewall.
  43. Shared key encryption
    Encryption based on a single key used for both encryption and decryption.
  44. Smart card
    Sometimes called an integrated circuit card (ICC), it is any pocket-sized plastic card with embedded integrated circuits, usually containing security information such as encryption keys to facilitate access control mechanisms.
  45. Spyware
    Software that monitors, records, and sometimes sends out computer activity, usually without the user’s knowledge.
  46. Symmetric key encryption
    Encryption based on a single key used for both encryption and decryption.
  47. TKIP
    Temporal Key Integrity Protocol (TKIP) An encryption algorithm that is used to encrypt keys used with WPA.
  48. Trojan horse (Trojan)
    A program that is expected to do one thing but actually does something else. The name is a reference to classical Greek literature.
  49. WPA
    Wi-Fi Protected Access (WPA) A wireless security standard that uses TKIP and user authentication.
  50. WEP
    Wired Equivalent Privacy (WEP) A security scheme that can provide basic security for 802.11b and 802.11g networks.
  51. Worm
    A self-propagating form of malicious software.
  52. Active Directory Users and Computers
    A Windows Active Directory utility used to manage organizational units, users, groups, computers, and other domain objects.
  53. Alert
    A response to a Windows performance threshold value being met or exceeded.
  54. Automated software delivery
    See electronic software distribution.
  55. Automatic failover
    A failover process in which an error is detected automatically, and the configuration switches over to the redundant server without administrator intervention.
  56. Backup
    The process of copying data stored on a computer and saving an exact duplicate of the data on another storage device.
  57. Baselining
    The process of collecting performance baseline information.
  58. Bottlenecks
    Network or computer components responsible for loss of performance.
  59. CMIP
    Common Management Information Protocol (CMIP) A management protocol developed in response to and as an alternative to SNMP.
  60. Disk duplexing
    A RAID 1 configuration based on two hard disks being connected to different disk controllers.
  61. Disk mirroring
    A RAID 1 configuration based on two hard disks being connected to the same disk controller.
  62. Disk striping with parity
    See RAID 5.
  63. ESD
    Electronic software distribution (ESD) A process by which software and updates are distributed automatically to network computers. Also known as automated software delivery and sometimes desktop management.
  64. EtherPeek
    A network monitoring application.
  65. Failover
    The process of switching over to a redundant computer.
  66. Fault
    A term that refers to the error reported when data cannot be found in memory.
  67. Fault tolerance
    The ability of equipment or network resources to continue operating even after a failure.
  68. Full backup
    Another term for normal backup.
  69. Hot redundancy
    A redundant configuration with duplicate hardware, software, and data, in which the data is kept in sync with the primary server to allow for immediate failover.
  70. Hot-swappable
    A device that can be replaced without powering off.
  71. Latency Network performance delays.
  72. Manual failover
    A failover process that requires administrator or operating intervention, typically because it is necessary to synchronize the data on the redundant server.
  73. Network administrator
    An individual who is responsible for network management and support.
  74. Network management
    The process of operating, monitoring, and controlling a network to ensure that it works as intended and provides value to its users.
  75. Normal backup
    A backup operation that backs up all specified data and resets the archive bit as each file is backed up. Also known as a full backup.
  76. Performance baseline
    Performance information used as a point of comparison for network and computer performance analysis. It often includes both typical and peak performance values.
  77. Promiscuous mode
    A mode of operation that allows a network adapter to intercept and read the complete contents of any packet on a network.
  78. RAID 1
    A fault-tolerant configuration based on two hard disk drives, with both containing the same data. Data is protected in the event of the failure of a single hard disk. See also disk mirroring and disk duplexing.
  79. RAID 5
    A fault-tolerant configuration based on three or more hard disks in which data and parity information are striped across the hard disks. Data is protected in the event of the failure of any one hard disk. Also known as disk striping with parity.
  80. Redundancy
    1.Duplicate data paths. 2. Duplication of resources.
  81. RAID
    Redundant array of independent (or inexpensive) disks (RAID) A disk configuration that provides improved disk performance, disk fault tolerance, or both.
  82. Redundant systems
    Systems that duplicate resources provided by primary network systems.
  83. SNMP
    Simple Network Management Protocol (SNMP) A TCP/IP protocol for remote configuration, monitoring, and management.
  84. Warm redundancy
    A redundant configuration with duplicate hardware and software but where data on the redundant hardware is not kept in sync with the primary server.
Card Set
NW203 Test3 Ch11-12 terms
NW203 Test3 Ch11-12 terms