with Error-free Answers.
3DES correct answers (Triple Data Encryption Standard) A symmetric encryption algorithm that
encrypts data by processing each block of data three times, using a different DES key each time.
802.11 correct answers A family of specifications developed by the IEEE for wireless LAN
technology.
802.11a correct answers A fast, secure, but relatively expensive protocol for wireless
communication. It Supports speeds up to 54 Mbps in the 5 GHz frequency.
802.11ac correct answers A wireless communication protocol that improves upon 802.11n by
adding wider channels to increase bandwidth.
802.11b correct answers The first specification to be called Wi-Fi, it is the least expensive
wireless network protocol used to transfer data among computers with wireless network cards, or
between a wireless computer or device and a wired LAN. It provides for an 11 Mbps transfer rate
in the 2.4 GHz frequency.
802.11g correct answers A specification for wireless data throughput at the rate of up to 54 Mbps
in the 2.4 GHz band that is a potential replacement for 802.11b
802.11n correct answers A wireless standard for home and business implementations that adds
QoS features and multimedia support to 802.11a and 802.11b.
802.1x correct answers An IEEE standard used to provide a port based authentication mechanism
over a LAN or WLAN
access control correct answers In IT security terms, the process of determining and assigning
privileges to various resources, objects, and data.
,Access Control Lists (ACL) correct answers In a DAC (discretionary access control) access
control scheme, this is the list that is associated with each object, specifying the subjects that can
access the object and their levels of access.
account federation correct answers The practice of linking a single account across many different
management systems.
account management correct answers A common term used to refer to the processes, functions,
and policies used to effectively manage user accounts within an organization.
account phishing correct answers In social networking, and attack where an attacker creates an
account and gets on the friends list of an individual just to try to obtain information about the
individual and their circle of friends or colleagues.
account policy correct answers A document that includes an organization's user account
management guidelines.
account privileges correct answers Permissions granted to users that allow them to perform
various actions such as creating, deleting, and editing files, and also accessing systems and
services on the network.
accountability correct answers In security terms, the process of determining who to hold
responsible for a particular activity or event.
accounting correct answers In IT security terms, the process of tracking and recording system
activities and resource access.
Active Directory correct answers The standards-based directory service from Microsoft that runs
on Microsoft Windows servers.
,adware correct answers Software that automatically displays or downloads advertisements when
it is used.
AES (Advanced Encryption Standard) correct answers A symmetric 128-, 192-, or 256-bit block
cipher based on the Rijndael algorithm developed by Belgian cryptographers Joan Daemen and
Vincent Rijmen and adopted by the U.S. government as its encryption standard to replace DES.
ALE (annual loss expectancy) correct answers The total cost of a risk to an organization on an
annual basis.
all-in-one-security appliance correct answers A single network device that is used to perform a
number of security functions to secure a network.
anomaly-based monitoring correct answers A monitoring system that uses a database of
unacceptable traffic patterns identified by analyzing traffic flows.
anti-malware software correct answers A category of software programs that scan a computer or
network for known viruses, Trojans, worms, and other malicious software.
anti-spam correct answers A program that will detect specific words that are commonly used in
spam messages.
anti-spyware correct answers Software that is specifically designed to protect systems against
spyware attacks.
antivirus software correct answers An application that scans files for executable code that
matches specific patterns that are known to be common to viruses.
API (application programming interface) correct answers A mechanism that defines how
software elements interact with each other.
, application attacks correct answers Attacks that are targeted at web-based and other client-server
applications.
application aware device correct answers A network device that manages information about any
application that connects to it.
application blacklisting correct answers The practice of preventing undesirable programs from
running on a computer, computer network, or mobile device.
application whitelisting correct answers The practice of allowing approved programs to run on a
computer, computer network, or mobile device.
arbitrary code execution correct answers An attack that exploits an applications vulnerability into
allowing the attacker to execute commands on a user's computer.
archive bit correct answers A file property that essentially indicates whether the file has been
modified since the last back up.
armored virus correct answers A virus that is able to conceal its location or otherwise render
itself harder to detect by anti-malware programs.
ARO (annual rate of occurrence) correct answers How many times per year a particular loss is
expected to occur.
ARP (Address Resolution Protocol) correct answers The mechanism by which individual
hardware MAC addresses are matched to an IP address on a network.
ARP poisoning correct answers A method in which an attacker, with access to the target network,
redirects an IP address to the MAC address of a computer that is not the intended recipient.