Acronyms (Page 8) - Reverse Flashcards

1
Q

A professional association with its corporate office in New York City and its operations center in Piscataway, New Jersey, dedicated to advancing technology for the benefit of humanity.

A

IEEE

Institute of Electrical and Electronics Engineers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A protocol used in IPsec for establishing a Security Association (SA) and cryptographic keys in an IP network.

A

IKE

Internet Key Exchange

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A type of online chat that offers real-time text transmission over the internet.

A

IM

Instant Messaging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An internet standard protocol used by email clients to retrieve messages from a mail server over a TCP/IP connection.

A

IMAP

Internet Message Access Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Artifacts observed on a network or in an operating system that with high confidence indicate a computer intrusion.

A

IoC

Indicators of Compromise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The extension of Internet connectivity into physical devices and everyday objects.

A

IoT

Internet of Things

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The principal communications protocol in the Internet protocol suite for relaying datagrams across network boundaries.

A

IP

Internet Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A network security/threat prevention technology that examines network traffic flows to detect and prevent vulnerability exploits.

A

IPS

Intrusion Prevention System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A secure network protocol suite that authenticates and encrypts the packets of data sent over an internet protocol network.

A

IPSec

Internet Protocol Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

An organized approach to addressing and managing the aftermath of a security breach or cyberattack.

A

IR

Incident Response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

An application layer protocol that facilitates communication in the form of text.

A

IRC

Internet Relay Chat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A set of instructions to help IT staff detect, respond to, and recover from network security incidents.

A

IRP

Incident Response Plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

An independent, non-governmental international organization with a membership of 164 national standards bodies.

A

ISO

International Standards Organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A company that provides subscribers with access to the Internet.

A

ISP

Internet Service Provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A person responsible for ensuring the appropriate operational security posture is maintained for an information system.

A

ISSO

Information Systems Security Officer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A fixed-size input to a cryptographic primitive that is typically required to be random or pseudorandom.

A

IV

Initialization Vector

17
Q

Part of a cryptosystem intended to reduce the risks inherent in exchanging keys.

A

KDC

Key Distribution Center

18
Q

A key used to encrypt other keys.

A

KEK

Key Encryption Key