Acronyms "Q, R, S" Flashcards

1
Q

QA

A

Quality Assurance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

QoS

A

Quality of Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

RA

A

Recovery Agent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

RACE

A

Research and Development in Advanced Communication Technologies in Europe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

RAD

A

Rapid Application Development

  • Agile software development approach
  • Focuses on ongoing software projects and user feedback and less on following a strict plan
  • Emphasizes rapid prototyping over costly planning
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

RADIUS

A

Remote Authentication Dial-in User Service

  • Provides centralized authentication to protect networks against unauthorized use
  • Could also be used for device administration, but its primary purpose is network authentication
  • Combines authentication and authorization
  • Encrypts only the password field, not the entire packet.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

RAID

A

Redundant Array of Inexpensive Disks

  • Storage virtualization technology that combines multiple physical disk drive components into one or more logical units
  • Used to increase data redundancy, performance, or both
  • Striping - spreads blocks of data across multiple disks. Great for increased performance but provides zero data redundancy or protection
  • Mirroring - copies the same data across disks. Provides data redundancy and protection from failure, but requires more disks which increases cost
  • Parity - calculated value that gets used to restore data from multiple drives if one of the drives were to fail. This prevents the need to mirror using separate drives since parity is spread among disks.
  • RAID 0 - striping
    • Needs 2 drives minimum
  • RAID 1 - mirroring
    • Needs 2 drives minimum
  • RAID 4 - striping and parity
    • Needs 3 drives minimum
  • RAID 5 - striping and parity
    • Needs 3 drives minimum
  • RAID 6 - striping and parity
    • Needs 4 drives minimum
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

RAM

A

Random Access Memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

RAS

A

Remote Access Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

RAT

A

Remote Access Trojan

  • Malware that gives the attacker admin control over the target computer
  • Typically used to then take further action
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

RBAC

A

Role-Based Access Control

  • Used to assign rights and permissions based on roles of users
  • Roles are usually assigned by groups
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

RC4

A

Rivest Cipher 4

  • Insecure
  • WEP
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

RCS

A

Rich Communication Services

  • Communication protocol between mobile telephone carriers and between phone and carrier, aiming at replacing SMS messages with a text-message system that is richer, provides phonebook polling (for service discovery), and can transmit in-call multimedia. It is part of the broader IP Multimedia Subsystem. Google added support for end-to-end encryption for one-on-one conversations in their own extension.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

RFC

A

Request for Comment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

RFID

A

Radio Frequency Identifier

  • Uses electromagnetic fields to automatically identify and track tags attached to objects
  • Consists of a tiny radio transponder, a radio receiver, and a transmitter
  • Made up of tags and readers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

RIPEMD

A

RACE Integrity Primitives Evaluation Message Digest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

ROI

A

Return on Investment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

RPO

A

Recovery Point Objective

  • an RPO of 24 hours means that the data can be recovered (from a backup copy) to a point not more than 24 hours
  • The maximum amount of data (measured by time) that can be lost after a recovery from a disaster or failure
  • Used to determine the frequency of backups
  • ie: if an RPO is 70 minutes, you require system backups every 70 minutes
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

RSA

A

Rivest, Shamir, Adleman

  • Algorithm used to encrypt and decrypt messages (public-key cryptosystem)
  • Asymmetric…the public key can be known to everyone
  • Messages encrypted using the public key can only be decrypted with the private key
  • Slower than some
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

RTBH

A

Remote Triggered Black Hole

  • Can be used to drop traffic before it enters a protected network
  • A common use is to mitigate DDoS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

RTO

A

Recovery Time Objective

  • Max amount of time it can take to recover after a failure or disaster before the business is significantly impacted
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

RTOS

A

Real-Time Operating System

  • Event-driven and preemptive
  • Switches between tasks based on their priorities (event-driven) or on a regular clocked interrupts and on events (time-sharing)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

RTP

A

Real-Time Transport Protocol

  • Used to transfer audio/video over IP networks
  • Streaming media, for example
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

S/MIME

A

Secure/Multipurpose Internet Mail Extensions

  • Provides a way to integrate public-key encryption and digital signatures into most modern email clients.
  • This would encrypt all email information from client to client, regardless of the communication used between email servers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

SaaS

A

Software as a Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

SAE

A

Simultaneous Authentication of Equals

  • Secure password-based authentication and password-authenticated key agreement method
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

SAML

A

Security Assertions Markup Language

  • XML-based markup language for security assertions
  • Allows an IdP to authenticate users and then pass an auth token to another application (service provider)
28
Q

SAN (Network)

A

Storage Area Network

  • Dedicated, independent high-speed network that interconnects and delivers shared pools of storage devices to multiple servers
29
Q

SAN (Digital Certificates)

A

Subject Alternative Name

  • Extension to X.509 that allows various values to be associated with a security certificate
30
Q

SCADA

A

System Control and Data Acquisition

  • Control system for high-level supervision of machines and processes
31
Q

SCAP

A

Security Content Automation Protocol

  • A synthesis of interoperable specifications derived from community ideas
32
Q

SCEP

A

Simple Certificate Enrollment Protocol

  • Makes the request and issuing of digital certificates as simple as possible
33
Q

SDK

A

Software Development Kit

  • Collection of software development tools you can install in one package
34
Q

SDLC

A

Software Development Life Cycle

35
Q

SDLM

A

Software Development Life Cycle Methodology

36
Q

SDN

A

Software Defined Networking

  • Makes networking a bit more like cloud computing than traditional network management by defining network technology via software
37
Q

SDV

A

Software Defined Visibility

  • Framework that allows customers, security and network equipment vendors, as well as MSPs, to control and program Gigamon’s Visibility Fabric via REST-based APIs
38
Q

SED

A

Self-Encrypting Drive

  • Data gets encrypted as it gets added to disk (HDD and SSD)
39
Q

SEH

A

Structured Exception Handler

  • A way of handling both software and hardware exceptions/failures gracefully
40
Q

SFTP

A

Secure File Transfer Protocol

41
Q

SHA

A

Secure Hashing Algorithm

42
Q

SHTTP

A

Secure Hypertext Transfer Protocol

  • Obsolete Alternative to HTTPS
43
Q

SIEM

A

Security Information and Event Management

44
Q

SIM

A

Subscriber Identity Module

  • SIM Card for phones
45
Q

SIP

A

Session Initiation Protocol

  • Used to initiate, maintain, and terminate real-time sessions that include voice, video, and messaging apps
46
Q

SLA

A

Service Level Agreement

47
Q

SLE

A

Single Loss Expectancy

  • Monetary value of an asset
  • % of loss for each realized threat
48
Q

SMS

A

Short Message Service

49
Q

SMTP

A

Simple Mail Transfer Protocol

50
Q

SMTPS

A

Simple Mail Transfer Protocol Secure

51
Q

SNMP

A

Simple Network Management Protocol

  • Networking protocols used for the management and monitoring of network-connected devices in IP networks
52
Q

SOAP

A

Simple Object Access Protocol

  • Lightweight XML-based protocol that’s used for exchanging information in decentralized, distributed application environments
  • Versus REST, which mostly uses JSON
53
Q

SOAR

A

Security Orchestration Automation Response

  • Technologies that enable orgs to collect inputs monitored by the security operations team
  • ie: alerts from the SIEM and other security tech where incident analysis and triage can be performed by leveraging a combination of human and machine power
54
Q

SOC (Hardware)

A

System on a Chip

  • Raspberry Pi is an example of SoC
  • Multiple components running on a single chip
55
Q

SOC

A

Security Operations Center

56
Q

SPF

A

Sender Policy Framework

  • Email-authentication technique which is used to prevent spammers from sending messages on behalf of your domain
57
Q

SPIM

A

Spam over Instant Message

58
Q

SQL

A

Structured Query Language

59
Q

SQLi

A

Structured Query Language Injection

60
Q

SRTP

A

Secure Real-Time Transfer Protocol

  • Provides encryption, message authentication and integrity, and replay attack protection to the RTP data
61
Q

SSD

A

Solid State Drive

62
Q

SSH

A

Secure Shell

63
Q

SSL

A

Secure Sockets Layer

64
Q

SSO

A

Single Sign On

65
Q

STIX

A

Structured Threat Information eXchange

  • XML structured language for sharing threat intelligence
  • Like TAXII, STIX is a community-driven project
66
Q

STP

A

Shielded Twisted Pair

67
Q

SWG

A

Secure Web Gateway

  • Protects users from web-based threads and applies and enforces corporate acceptable use policies
  • Instead of connecting directly to a website, the user accesses the SWG, which then connects the user to the desired website
  • This helps with URL filtering, web visibility, malicious content inspection, web access controls, and more