Acronyms (Page 5) Flashcards

1
Q

DoS

A

Denial of Service

A cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

DPO

A

Data Privacy Officer

A role within a company or organization responsible for ensuring that the company complies with data protection laws.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

DRP

A

Disaster Recovery Plan

A structured approach with policies and procedures for responding to an unplanned incident and recovering critical systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

DSA

A

Digital Signature Algorithm

A standard for digital signatures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

DSL

A

Digital Subscriber Line

A family of technologies that provide internet access by transmitting digital data over the wires of a local telephone network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

EAP

A

Extensible Authentication Protocol

An authentication framework frequently used in wireless networks and Point-to-Point connections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

ECB

A

Electronic Code Book

A mode of operation for a block cipher, with the characteristic that each possible block of plaintext has a defined corresponding ciphertext value.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

ECC

A

Elliptic Curve Cryptography

An approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

ECDHE

A

Elliptic Curve Diffie-Hellman Ephemeral

A variant of the Diffie-Hellman algorithm that uses elliptic curve cryptography.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

ECDSA

A

Elliptic Curve Digital Signature Algorithm

A cryptographic algorithm used by Bitcoin to ensure that funds can only be spent by their rightful owners.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

EDR

A

Endpoint Detection and Response

A cybersecurity technology that addresses the need for continuous monitoring and response to advanced threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

EFS

A

Encrypted File System

A feature of some versions of Microsoft Windows that provides filesystem-level encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

ERP

A

Enterprise Resource Planning

Business process management software that allows an organization to use a system of integrated applications to manage the business and automate many back office functions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

ESN

A

Electronic Serial Number

A unique identification number embedded by manufacturers on a microchip in wireless phones.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ESP

A

Encapsulated Security Payload

A component of IPsec used for providing confidentiality, along with some authentication and integrity, to the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

FACL

A

File System Access Control List

A data structure, most often associated with Microsoft Windows and NTFS, that controls access to files and folders.

17
Q

FDE

A

Full Disk Encryption

Encryption at the hardware level.