Acronyms "D, E, F" Flashcards

1
Q
  • DAC (Discretionary Access Control)
A
  • Restrict access based on the identity of subjects and/or groups that they belong to
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  • DBA (Database Administrator)
A
  • DBA (Database Administrator)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  • DDoS (Distributed Denial of Service)
A
  • DDoS (Distributed Denial of Service)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  • DEP (Data Execution Prevention)
A
  • Microsoft security feature
    • Monitor and protects pages or regions of memory
    • Prevents data regions from executing (potentially malicious) code
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  • DER (Distinguished Encoding Rules)
A

variant of BER for digital certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  • DES (Data Encryption Standard)
A
  • Weak encryption algorithm
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  • DHCP (Dynamic Host Configuration Protocol)
A
  • automatically assigns an IP for a newly connected computer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  • DHE (Diffie-Hellman Ephemeral)
A
  • Way of securely exchanging cryptographic keys over public channels
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  • DKIM (Domain Keys Identified Mail)
A
  • Email authentication technique

- Allows the receiver to make sure that an email was sent by the authorized owner of that domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  • DLL (Dynamic Link Library)
A
  • a library that contains code and data that can be used by more than one program at the same time
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  • DLP (Data Loss Prevention)
A
  • detecting and preventing data breaches, exfiltration, or unwanted destruction of sensitive data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  • DMARC (Domain Message Authentication Reporting and Conformance)
A
  • Authenticates emails with SPF and DKIM

- Used to prevent phishing and spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  • DMZ (Demilitarized Zone)
A
  • a physical or logical subnet that separates a local area network (LAN) from other untrusted networks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  • DNAT (Destination Network Address Translation)
A
  • used when we need to redirect incoming packets with a destination of a public address/port to a private IP address/port inside your network.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  • DNS (Domain Name System)
A
  • converts domain names into ip addresses
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  • DNSSEC (Domain Name System Security Extensions)
A
  • Security features for DNS.

- Provides cryptographic authentication of data, authenticated denial of existence, and data integrity

17
Q
  • DoS (Denial of Service)
A
  • DoS (Denial of Service)
18
Q
  • DPO (Data Privacy Officer)
A
  • DPO (Data Privacy Officer)
19
Q
  • DRP (Disaster Recovery Plan)
A
  • DRP (Disaster Recovery Plan)
20
Q
  • DSA (Digital Signature Algorithm)
A
  • Federal Information Processing Standard for digital signatures
21
Q
  • DSL (Digital Subscriber Line)
A
  • a family of technologies that are used to transmit digital data over telephone lines.
22
Q
  • EAP (Extensible Authentication Protocol)
A
  • Authentication framework used in LANs

- Widely used

23
Q
  • ECB (Electronic Code Book)
A
  • Doesn’t hide data patterns well, so it wouldn’t work to encrypt images for example
24
Q
  • ECC (Elliptic Curve Cryptography)
A
  • Good for mobile devices because it can use smaller keys, lower processing power
25
Q
  • ECDHE (Elliptic Curve Diffie-Hellman Ephemeral)
A
  • Key exchange mechanism based on elliptic curves
26
Q
  • ECDSA (Elliptic Curve Digital Signature Algorithm)
A
  • Digital signature algorithm based on elliptic curve cryptography (ECC)
27
Q
  • EDR (Endpoint Detection and Response)
A
  • endpoint security solution that continuously monitors end-user devices to detect and respond to cyber threats like ransomware and malware.
28
Q
  • EFS (Encrypted File System)
A
  • encryption system built into Windows since Windows 2000. Cousin of BitLocker, still exists in Win 10.
  • EFS can do files, BitLocker can only do entire drives
29
Q
  • EOL (End of Life)
A
  • Date set where manufacturer will no longer create the product
30
Q
  • EOS (End of Service)
A
  • Original manufacturer no longer offers updates, support, or service
31
Q
  • ERP (Enterprise Resource Planning)
A
  • Software used by orgs to manage day-to-day business activities
32
Q
  • ESN (Electronic Serial Number)
A
  • ESN (Electronic Serial Number)
33
Q
  • ESP (Encapsulated Security Payload)
A
  • Member of IPsec set of protocols

- Encrypts and authenticates packets of data between computers using VPNs

34
Q
  • FACL (File System Access Control List)
A
  • File System Access Control List
35
Q
  • FDE (Full Disk Encryption)
A
  • FDE (Full Disk Encryption)
36
Q
  • FPGA (Field Programmable Gate Array)
A
  • Integrated circuit designed to be configured by a customer or designer after manufacturing.
    • primarily used in telecommunications and networking.
    • now also in consumer, automotive, and industrial applications
37
Q
  • FRR (False Rejection Rate)
A
  • Likelihood that a biometric security system will incorrectly reject an access attempt by an authorized user
38
Q
  • FTP (File Transfer Protocol)
A
  • FTP (File Transfer Protocol)
39
Q
  • FTPS (Secured File Transfer Protocol)
A
  • FTPS (Secured File Transfer Protocol)

- Port: 989, 990 TCP/UDP