Busy. Please wait.
Log in with Clever

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever

Username is available taken
show password

Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.

Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
Didn't know it?
click below
Knew it?
click below
Don't know
Remaining cards (0)
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

Chapter 4 Terms

Security+ SY0-501 7th Edition Terms (Chapter 4)

Challenge Handshake Authentication Protocol (CHAP) An authentication protocol that periodically reauthenticates.
crossover error rate (CER) The point at which the FRR and FAR are equal. Sometimes called the equal error rate (ERR).
data execution prevention (DEP) Any technique that prevents a program from running without the user’s approval.
data loss prevention (DLP) Software or techniques designed to detect attempts to exfiltrate data.
false acceptance rate (FAR) The rate at which a biometric solution allows in individuals it should have rejected.
false rejection rate (FRR) The rate at which a biometric solution rejects individuals it should have allowed.
federation A collection of computer networks that agree on standards of operation, such as security standards.
HIDS A host-based intrusion detection system. An HIPS is a host-based intrusion prevention system.
Kerberos An authentication protocol developed at MIT that uses tickets for authentication.
least privileges The principle that any user or service will be given only enough access privileges to do its job and no more.
NIDS A network-based intrusion detection system. An NIPS is an intrusion prevention system. Unlike an HIDS/HIPS, an NIDS/NIPS scans an entire network segment.
network scanner A tool that enumerates your network and provides a map of the network.
OAUTH Open Authorization standard. It is a common method for authorizing websites or applications to access information.
Mandatory access control (MAC) Establishes rigid access control methods in the organization.
Discretionary access control (DAC) Allows for flexibility in access control.
Role-based access control (RBAC) Based on the role the individual or department has in the organization.
Rule-based access control (RBAC) Settings in preconfigured security policies, are used to make all decisions.
Created by: StudySleeping
Popular Computers sets




Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
restart all cards