COMP TIA Acronyms 2 Flashcards
Is an ASN.1 subnet of Basic Encoding Rules, and give exactly one way to represent any ASN.1 value as an Octet String
Distinguished Encoding Rules (DER)
Is a symmetric key algorithm for the encryption of digital data. Although its short key length of 56 bits makes it too insecure for modern applications, it has been highly influential in the advancement of cryptography
Data Encryption Standard (DES)
Is a network management protocol used on Internet Protocol network for automatically assigning IP addresses and other communication parameters to devices connected to the network using a client-server architecture
Dynamic Host Configuration Protocol (DHCP)
A method used to securely exchange or establish secret keys across an insecure network.
Diffie-Hellman Ephermeral (DHE)
Is an email authentication method designed to detect forged sender addresses in email (email spoofing), a technique often used in phishing and email spam
Domain Keys Identified Mail (DKIM)
That contains code and data that can be used by more than one program at the same time
Dynamic Link Library (DLL)
A security solution that identifies and helps prevent unsafe or inappropriate sharing, transfer or use of sensitive data
Data Loss Prevention (DLP)
Is an email security protocol Verifies email senders by building on the Domain Name System (DNS), Domainkeys Identified Mail (DKIM) and Sender Policy Framework (SPF) protocols
Domain Message Authentication (DMARC)
Each IP datagram contains a Source Address and a Destination Address. Is used to route that datagram to its destination
Destination Network Address Transaction (DNAT)
Turns domain names into IP addresses, which allow browsers to get to websites and other internet sources
Domain Name System (DNS)
Creates a secure domain name system by adding cryptographic signatures to existing DNS records
Domain Name System Security Extensions (DNSSEC)
Is a type of cyber attack designed to disable, shut down or disrupt a network, website or service
Denial-of-Service (DoS)
Is to ensure that the organization processes the personal data of its staff, customers, providers or any other individuals
Data Protection Officer (DPO)
Is a formal document created by organizations that contains detailed instructions on how to respond to unplanned incidents such as natural disasters, power outages, cyber attacks and any other disruptive events
Disaster Recovery Plan (DRP)
Uses a key pair consisting of a public key and a private key. The private key is used to generate a digital signature for a message. Public key can be verified by using signers
Digital Signature Algorithm (DSA)
Is a modern technology that uses existing telephone lines to transport high-bandwidth data, such as multimedia and video, to service subscribers
Digital Subscriber Line (DSL)
Is used to pass the authentication information between the supplicant (the Wi-Fi workstation) and the authentication server (Microsoft IAS or other)
Extensible Authentication Protocol (EAP)
It uses no initialization vector or chaining Identical plaintexts with identical keys encrypt to identical ciphertexts
Electronic Code Book (ECB)
Is a key based technique for encrypting data.
Elliptic-Curve Cryptography (ECC)
Is the method used during the key exchange between the server and the client so that the result is a pre-master secret know to both parties
Elliptical-Curve Diffie-Hellman Ephemera (ECDSA)
Relies on elliptic curves defined over a finite field to generate and verify signatures
Elliptical-Curve Digital Signature Algorithm (ECDSA)
Also referred to as endpoint detection and threat response
Endpoint Detection and Response (EDR)
Provides an added layer of protection by encrypting files or folders on various versions of the Microsoft Windows OS
Encrypted File System (EFS)
Date of an Operating System or Application is the date of which the device will no longer be actively supported
End of Life (EOL)