Sec +

15 cards   |   Total Attempts: 188
  

Cards In This Set

Front Back
Holds a copy of the active Directory database
Domain Controller
Manages access for a workstation
Computer Object
Manages access for an employee
User Object
Can be created to logically organize network resources
Organizational Unit
Cannot be moved, renamed, or deleted
Generic Container
Defines a collection of network resources that share a common directory database
Domain
Identifies the object classes (the type of objects) that exist in the tree and the attributes (properties) of the object
Schema
Attackers convice personnel to grant access to sensitive information or protected systems by pretending to be someone who is authorized and/or requires that access.
Masquerading
Attackers send e-mails to senior executives and high profile personnel pretending to be from a trusted organization asking to verify personal information or send money.
Whaling
Attackers use Voice over IP (VoIP) to pretend to be from a trusted organization asking victims to verify personal information or send money.
Vishing
Attackers send e-mails with specific information about the victim (such as which online banks they use) that ask them to verify personal information or send money.
Spear phishing
Attackers send unwanted and unsolicited text messages to many people with the intent to sell products or services.
Spim
Repeatedly blasts receiving equipment with high-intensity, short-duration RF bursts at a rapid pace
Spark jamming
Produces RF signals using random amplitudes and frequencies
Random noise jamming
Uses radio signal pulses of random amplitude and frequency
Random pulse jamming