Busy. Please wait.

show password
Forgot Password?

Don't have an account?  Sign up 

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
We do not share your email address with others. It is only used to allow you to reset your password. For details read our Privacy Policy and Terms of Service.

Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
Don't know
remaining cards
To flip the current card, click it or press the Spacebar key.  To move the current card to one of the three colored boxes, click on the box.  You may also press the UP ARROW key to move the card to the "Know" box, the DOWN ARROW key to move the card to the "Don't know" box, or the RIGHT ARROW key to move the card to the Remaining box.  You may also click on the card displayed in any of the three boxes to bring that card back to the center.

Pass complete!

"Know" box contains:
Time elapsed:
restart all cards
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

Chapter 4 Terms

Security+ SY0-501 7th Edition Terms (Chapter 4)

Challenge Handshake Authentication Protocol (CHAP) An authentication protocol that periodically reauthenticates.
crossover error rate (CER) The point at which the FRR and FAR are equal. Sometimes called the equal error rate (ERR).
data execution prevention (DEP) Any technique that prevents a program from running without the user’s approval.
data loss prevention (DLP) Software or techniques designed to detect attempts to exfiltrate data.
false acceptance rate (FAR) The rate at which a biometric solution allows in individuals it should have rejected.
false rejection rate (FRR) The rate at which a biometric solution rejects individuals it should have allowed.
federation A collection of computer networks that agree on standards of operation, such as security standards.
HIDS A host-based intrusion detection system. An HIPS is a host-based intrusion prevention system.
Kerberos An authentication protocol developed at MIT that uses tickets for authentication.
least privileges The principle that any user or service will be given only enough access privileges to do its job and no more.
NIDS A network-based intrusion detection system. An NIPS is an intrusion prevention system. Unlike an HIDS/HIPS, an NIDS/NIPS scans an entire network segment.
network scanner A tool that enumerates your network and provides a map of the network.
OAUTH Open Authorization standard. It is a common method for authorizing websites or applications to access information.
Mandatory access control (MAC) Establishes rigid access control methods in the organization.
Discretionary access control (DAC) Allows for flexibility in access control.
Role-based access control (RBAC) Based on the role the individual or department has in the organization.
Rule-based access control (RBAC) Settings in preconfigured security policies, are used to make all decisions.
Created by: StudySleeping