Level 42 Level 44
Level 43

616 - 630

15 words 0 ignored

Ready to learn       Ready to review

Ignore words

Check the boxes below to ignore/unignore words, then click save at the bottom. Ignored words will never appear in any learning session.

All None

UPN (User Principle Name) Suffix
The portion of a universal principle name (in Active Directory's naming
X Window System
The GUI environment for UNIX and Linux systems.
In a ______ attack, a person redirects or captures secure transmissions as they occur.
Port scanner
____software searches a node for open ports.
Transmission and hardware
A router that is not configured to drop packets that match certain or suspicious
Protocols and software
A NOS that contains a " back door" is an example of a risk associated with ___.
A ____ attack occurs when an internet chat user sends commands to a victim's machine that causes
A ___ attack occurs when a system becomes unable it has inundated with requests for
A ______ firewall is a router(or a computer installed with software that enables it to act
A _____ attack occurs when a hacker uses programs that try a combination of a user ID and every
Brute Force
A ____ attack occurs when a hacker tries numerous possible character combinations to find the key
Key pair
The combination of a public key and a private key is known as a ____.
Digital Certificate
A(n) ___ is a password-protected and encrypted file that hols an individual's
The use of certificate authorities to associate public keys with certain users is known as
____ is a public key encryption system that can verify the authenticity of an e-mail sender and encrypt