Ack4 Flashcards

1
Q

HOTP

A

HMAC-based One-Time Password

algorithm for token-based (smart card or QR code) authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

HSM

A

Hardware Security Module
An appliance for generating & storing cryptographic keys. It is designed to be tamper-evident to mitigate against insider threat risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

HSMaaS

A

Hardware Security Module as a Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

IaaS

A

Infrastructure as a Service

computing method that uses the cloud to provide any or all infrastructure needs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

IAM

A

Identity and Access Management
A security process that provides identification, authentication, and authorization mechanisms for users, computers, and other entities to work with organizational assets like networks, operating systems, and applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

ICMP

A

Internet Control Message Protocol

use with ping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

ICS

A

Industrial Control Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

IDEA

A

International Data Encryption Algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

IDF

A

Intermediate Distribution Frame

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

IdP

A

Identity Provider

user auth’d to identity provider for a crypto-token

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

IDS

A

Intrusion Detection System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

IEEE

A

Institute of Electrical & Electronics Engineers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

IKE

A

Internet Key Exchange

Framework for creating a Security Association (SA) used with IPSec. An SA establishes that two hosts trust one another (authenticate) and agree secure protocols and cipher suites to use to exchange data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

IM

A

Instate Messaging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

IMAP4

A

Internet Message Access Protocol v4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

IoC

A

Indicators of Compromise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

IoT

A

Internet of Things

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

IP

A

Internet Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

IPS

A

Intrusion Prevention System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

IPSec

A

Internet Protocol Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

IR

A

Incident Response

22
Q

IRC

A

Internet Relay Chat

23
Q

IRP

A

Incident Response Plan

24
Q

ISA

A

Interconnection Security Agreement

Federal agency interconnecting IT to a 3rd party. Sets security risk awareness & security controls

25
Q

ISFW

A

Internal Segmentation Firewall

26
Q

ISO

A

International Organization for Standardization

27
Q

ISP

A

Internet Service Provider

28
Q

ISSO

A

Information Systems Security Officer

29
Q

ITCP

A

IT Contingency Plan

30
Q

IV

A

Initialization Vector

31
Q

KDC

A

Key Distribution Center

32
Q

KEK

A

Key Encryption Key

33
Q

L2TP

A

Layer 2 Tunneling Protocol

34
Q

LAN

A

Local Area Network
A bunch of computers linked together (like in a school, residence, or office)
Allow shared access to printers, files, …

35
Q

IP

A

Addresses in computer networks
Consists of two components: the network address and the host address.
The network address finds the subnet the computer or the device is located
The host address finds the computer or the device in the subnet

36
Q

LDAP

A

Lightweight Directory Access Protocol
An application attack that targets web-based applications by fabricating LDAP statements that are typically created by user input

37
Q

LEAP

A
Lightweight Extensible Authentication Protocol
Cisco EAP (wireless authentication framework -not a way to auth) Implementation
38
Q

MaaS

A

Monitoring as a Service
Cloud service providing ongoing security and availability monitoring of on-premises and/or cloud-based hosts and services

39
Q

MAC

A

Media Access Control

identifies that device from every other globally

40
Q

MAM

A

Mobile Application Management

41
Q

MAN

A

Metropolitan Area Network

42
Q

MBR

A

Master Boot Record

43
Q

MD5

A

Message Digest Algorithm V5
cryptographic hash function producing a
128-bit output

44
Q

MDF

A

Main Distribution Frame

connect equipment to cables

45
Q

MDM

A

Mobile Device Management

46
Q

MFA

A

Multifactor Authentication

47
Q

MFD

A

Multifunction Device

48
Q

MFP

A

Multifunction Printer

49
Q

MITM

A

Man-in-the-Middle
A form of eavesdropping where the attacker makes an independent connection between two victims and steals information to use fraudulently

50
Q

MEF

A

Mission Essential Function

Business activity too critical to be deferred for longer than a few hours