Acronyms (Page 14) - Reverse Flashcards

1
Q

A technology that combines multiple disk drive components into a logical unit for data redundancy and performance improvement.

A

RAID

Redundant Array of Inexpensive Disks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A server that provides a remote access service to users or client computers.

A

RAS

Remote Access Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A malware program that includes a back door for administrative control over the target computer.

A

RAT

Remote Access Trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An approach to restricting system access to authorized users based on their role within an organization.

A

RBAC

Role-based Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A policy-neutral access control mechanism defined around roles and privileges.

A

RBAC

Rule-based Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A stream cipher that is simple and fast but has vulnerabilities and is considered insecure.

A

RC4

Rivest Cipher version 4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A proprietary protocol developed by Microsoft that provides a user with a graphical interface to connect to another computer over a network connection.

A

RDP

Remote Desktop Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A technology that uses electromagnetic fields to automatically identify and track tags attached to objects.

A

RFID

Radio Frequency Identifier

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A family of cryptographic hash functions developed in Belgium.

A

RIPEMD

RACE Integrity Primitives Evaluation Message Digest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A measure used to evaluate the efficiency of an investment or compare the efficiency of a number of different investments.

A

ROI

Return on Investment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The maximum acceptable amount of data loss measured in time.

A

RPO

Recovery Point Objective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

One of the first public-key cryptosystems and is widely used for secure data transmission.

A

RSA

Rivest, Shamir, & Adleman

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A technique used to block denial-of-service attacks in IP networks.

A

RTBH

Remotely Triggered Black Hole

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The targeted duration of time and a service level within which a business process must be restored after a disaster or disruption.

A

RTO

Recovery Time Objective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

An operating system intended to serve real-time application process data as it comes in, typically without buffering delays.

A

RTOS

Real-time Operating System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A network protocol for delivering audio and video over IP networks.

A

RTP

Real-time Transport Protocol

17
Q

A standard for public key encryption and signing of MIME data.

A

S/MIME

Secure/Multipurpose Internet Mail Extensions

18
Q

A software distribution model in which a third-party provider hosts applications and makes them available to customers over the internet.

A

SaaS

Software as a Service