Ack3 Flashcards

1
Q

DER

A

Distinguished Encoding Rules

binary format used to structure the information in a digital certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

DES

A

Data Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

DHCP

A

Dynamic Host Configuration Protocol

Only one server should be offering up IP addresses. a rogue can DoS or snoop, or starve (repeat IP requests)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

DHE

A

Diffie-Hellman Ephemeral

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

DKIM

A

Domain Keys Identified Mail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

DLL

A

Dynamic Link Library

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

DLP

A

Data Loss Prevention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

DMARC

A

Domain Message Authentication Reporting & Conformance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

DMZ

A

Demilitarized Zone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

DNAT

A

Destination Network Address Transaction
NAT service where private Internal addresses are mapped to one or more public addresses to facilitate Internet connectivity for hosts on a local network via a router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

DNS

A

Domain Name Systen

Ph book of the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

DNSSEC

A

Domain Name System Security Extensions

A security protocol that provides authentication of DNS data and upholds DNS data integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

DoS

A

Denial-of-service

Any type of physical, application, or network attack that affects the availability of a managed resource.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

DPO

A

Data Protection Officer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

DRP

A

Disaster Recovery Plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

DSA

A

Digital Subscriber Line (internet access over voice lines)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

EAP

A

Extensible Authentication Protocol

Authenticate clients & LAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

ECB

A

Electronic Code Book

first generation of the AES. It is the most basic form of block cipher encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

ECC

A

Elliptic-curve Cryptography
An asymmetric encryption algorithm that leverages the algebraic structures of elliptic curves over finite fields to derive public/private key pairs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

ECC
ECDHE
ECDSA

A

Elliptic-curve Crytpography
Elliptic-curve Diffie-Helman Ephemeral
Elliptic-curve Digital Signature Algorithm

21
Q

EDR

A

Endpoint Detection & Response
software agent that collects system data and logs for analysis by a monitoring system to provide early detection of threats

22
Q

EFS

A

Encrypted File System

23
Q

EIP

A

Extended Instruction Pointer

24
Q

EOL

A

End of Life

Product life cycle phase where sales are discontinued and support options reduced over time

25
Q

EOSL

A

End of Service Life

Product life cycle phase where support is no longer available from the vendor.

26
Q

ERP

A

Enterprise Resource Planning

27
Q

ESN

A

Electronic Serial Number

28
Q

ESP

A

Encapsulating Security Payload

IPSec sub-protocol that enables encryption and authentication of the header and payload of a data packet.

29
Q

FDE

A

Full Disk Encryption

30
Q

FACL

A

File System Access Control List

31
Q

FIM

A

File Integrity Monitoring

software that reviews system files to ensure that they have not been tampered with

32
Q

FPGA

A
Field Programmable Gate Array
A processor (microcontroller) that can be programmed to perform a specific function by a customer rather than at the time of manufacture
33
Q

FRR

A

False Rejection Rate

34
Q

FTP

A

File Transfer Protocol

35
Q

FTPS

A

Secured File Transport Protocol

36
Q

GCM

A

Galois/Counter Mode
A mode of block chained encryption that provides message authenticity for each block.
Replaced AES CCMP

37
Q

GDPR

A

General Data Protection Regulation
Provisions and requirements protecting the personal data of European Union (EU) citizens
US is Privacy Shield Requirements

38
Q

GPG

A

GNU Privacy Guard

39
Q

GPO

A

Group Policy Object
used to configure access rights
a way to deploy per user and per-computer settings such as password policy, account restrictions, firewall status

40
Q

GPU

A

Graphic Processing Unit

41
Q

GRE

A

Generic Routing Encapsulation

42
Q

HA

A

High Availability

43
Q

HDD

A

Hard Disk Drive

44
Q

HIDS

A

Host-based Intrusion Detection System

45
Q

HIPS

A

Host-based Intrusion Prevention System

46
Q

HMAC

A

Hash-based Message Authentication Code
method used to verify both the integrity & authenticity of a message by combining a cryptographic hash of the message with a secret key

47
Q

EPP

A

(endpoint protection platform) A software agent and monitoring system that performs multiple security tasks.

48
Q

ERM

A

(enterprise risk management) The comprehensive process of evaluating, measuring, and mitigating the many risks that pervade an organization