Ack3 Flashcards

1
Q

DER

A

Distinguished Encoding Rules

binary format used to structure the information in a digital certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

DES

A

Data Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

DHCP

A

Dynamic Host Configuration Protocol

Only one server should be offering up IP addresses. a rogue can DoS or snoop, or starve (repeat IP requests)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

DHE

A

Diffie-Hellman Ephemeral

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

DKIM

A

Domain Keys Identified Mail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

DLL

A

Dynamic Link Library

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

DLP

A

Data Loss Prevention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

DMARC

A

Domain Message Authentication Reporting & Conformance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

DMZ

A

Demilitarized Zone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

DNAT

A

Destination Network Address Transaction
NAT service where private Internal addresses are mapped to one or more public addresses to facilitate Internet connectivity for hosts on a local network via a router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

DNS

A

Domain Name Systen

Ph book of the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

DNSSEC

A

Domain Name System Security Extensions

A security protocol that provides authentication of DNS data and upholds DNS data integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

DoS

A

Denial-of-service

Any type of physical, application, or network attack that affects the availability of a managed resource.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

DPO

A

Data Protection Officer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

DRP

A

Disaster Recovery Plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

DSA

A

Digital Subscriber Line (internet access over voice lines)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

EAP

A

Extensible Authentication Protocol

Authenticate clients & LAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

ECB

A

Electronic Code Book

first generation of the AES. It is the most basic form of block cipher encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

ECC

A

Elliptic-curve Cryptography
An asymmetric encryption algorithm that leverages the algebraic structures of elliptic curves over finite fields to derive public/private key pairs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

ECC
ECDHE
ECDSA

A

Elliptic-curve Crytpography
Elliptic-curve Diffie-Helman Ephemeral
Elliptic-curve Digital Signature Algorithm

21
Q

EDR

A

Endpoint Detection & Response
software agent that collects system data and logs for analysis by a monitoring system to provide early detection of threats

22
Q

EFS

A

Encrypted File System

23
Q

EIP

A

Extended Instruction Pointer

24
Q

EOL

A

End of Life

Product life cycle phase where sales are discontinued and support options reduced over time

25
EOSL
End of Service Life | Product life cycle phase where support is no longer available from the vendor.
26
ERP
Enterprise Resource Planning
27
ESN
Electronic Serial Number
28
ESP
Encapsulating Security Payload | IPSec sub-protocol that enables encryption and authentication of the header and payload of a data packet.
29
FDE
Full Disk Encryption
30
FACL
File System Access Control List
31
FIM
File Integrity Monitoring | software that reviews system files to ensure that they have not been tampered with
32
FPGA
``` Field Programmable Gate Array A processor (microcontroller) that can be programmed to perform a specific function by a customer rather than at the time of manufacture ```
33
FRR
False Rejection Rate
34
FTP
File Transfer Protocol
35
FTPS
Secured File Transport Protocol
36
GCM
Galois/Counter Mode A mode of block chained encryption that provides message authenticity for each block. Replaced AES CCMP
37
GDPR
General Data Protection Regulation Provisions and requirements protecting the personal data of European Union (EU) citizens US is Privacy Shield Requirements
38
GPG
GNU Privacy Guard
39
GPO
Group Policy Object used to configure access rights a way to deploy per user and per-computer settings such as password policy, account restrictions, firewall status
40
GPU
Graphic Processing Unit
41
GRE
Generic Routing Encapsulation
42
HA
High Availability
43
HDD
Hard Disk Drive
44
HIDS
Host-based Intrusion Detection System
45
HIPS
Host-based Intrusion Prevention System
46
HMAC
Hash-based Message Authentication Code method used to verify both the integrity & authenticity of a message by combining a cryptographic hash of the message with a secret key
47
EPP
(endpoint protection platform) A software agent and monitoring system that performs multiple security tasks.
48
ERM
(enterprise risk management) The comprehensive process of evaluating, measuring, and mitigating the many risks that pervade an organization