Acronyms (Page 5) - Reverse Flashcards

1
Q

A cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet.

A

DoS

Denial of Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A role within a company or organization responsible for ensuring that the company complies with data protection laws.

A

DPO

Data Privacy Officer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A structured approach with policies and procedures for responding to an unplanned incident and recovering critical systems.

A

DRP

Disaster Recovery Plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A standard for digital signatures.

A

DSA

Digital Signature Algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A family of technologies that provide internet access by transmitting digital data over the wires of a local telephone network.

A

DSL

Digital Subscriber Line

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An authentication framework frequently used in wireless networks and Point-to-Point connections.

A

EAP

Extensible Authentication Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields.

A

ECC

Elliptic Curve Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A mode of operation for a block cipher, with the characteristic that each possible block of plaintext has a defined corresponding ciphertext value.

A

ECB

Electronic Code Book

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A variant of the Diffie-Hellman algorithm that uses elliptic curve cryptography.

A

ECDHE

Elliptic Curve Diffie-Hellman Ephemeral

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A cryptographic algorithm used by Bitcoin to ensure that funds can only be spent by their rightful owners.

A

ECDSA

Elliptic Curve Digital Signature Algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A cybersecurity technology that addresses the need for continuous monitoring and response to advanced threats.

A

EDR

Endpoint Detection and Response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A feature of some versions of Microsoft Windows that provides filesystem-level encryption.

A

EFS

Encrypted File System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Business process management software that allows an organization to use a system of integrated applications to manage the business and automate many back office functions.

A

ERP

Enterprise Resource Planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A unique identification number embedded by manufacturers on a microchip in wireless phones.

A

ESN

Electronic Serial Number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A component of IPsec used for providing confidentiality, along with some authentication and integrity, to the data.

A

ESP

Encapsulated Security Payload

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A data structure, most often associated with Microsoft Windows and NTFS, that controls access to files and folders.

A

FACL

File System Access Control List

17
Q

Encryption at the hardware level.

A

FDE

Full Disk Encryption