COMP TIA Acronyms 2 Flashcards
Is an ASN.1 subnet of Basic Encoding Rules, and give exactly one way to represent any ASN.1 value as an Octet String
Distinguished Encoding Rules (DER)
Is a symmetric key algorithm for the encryption of digital data. Although its short key length of 56 bits makes it too insecure for modern applications, it has been highly influential in the advancement of cryptography
Data Encryption Standard (DES)
Is a network management protocol used on Internet Protocol network for automatically assigning IP addresses and other communication parameters to devices connected to the network using a client-server architecture
Dynamic Host Configuration Protocol (DHCP)
A method used to securely exchange or establish secret keys across an insecure network.
Diffie-Hellman Ephermeral (DHE)
Is an email authentication method designed to detect forged sender addresses in email (email spoofing), a technique often used in phishing and email spam
Domain Keys Identified Mail (DKIM)
That contains code and data that can be used by more than one program at the same time
Dynamic Link Library (DLL)
A security solution that identifies and helps prevent unsafe or inappropriate sharing, transfer or use of sensitive data
Data Loss Prevention (DLP)
Is an email security protocol Verifies email senders by building on the Domain Name System (DNS), Domainkeys Identified Mail (DKIM) and Sender Policy Framework (SPF) protocols
Domain Message Authentication (DMARC)
Each IP datagram contains a Source Address and a Destination Address. Is used to route that datagram to its destination
Destination Network Address Transaction (DNAT)
Turns domain names into IP addresses, which allow browsers to get to websites and other internet sources
Domain Name System (DNS)
Creates a secure domain name system by adding cryptographic signatures to existing DNS records
Domain Name System Security Extensions (DNSSEC)
Is a type of cyber attack designed to disable, shut down or disrupt a network, website or service
Denial-of-Service (DoS)
Is to ensure that the organization processes the personal data of its staff, customers, providers or any other individuals
Data Protection Officer (DPO)
Is a formal document created by organizations that contains detailed instructions on how to respond to unplanned incidents such as natural disasters, power outages, cyber attacks and any other disruptive events
Disaster Recovery Plan (DRP)
Uses a key pair consisting of a public key and a private key. The private key is used to generate a digital signature for a message. Public key can be verified by using signers
Digital Signature Algorithm (DSA)
Is a modern technology that uses existing telephone lines to transport high-bandwidth data, such as multimedia and video, to service subscribers
Digital Subscriber Line (DSL)
Is used to pass the authentication information between the supplicant (the Wi-Fi workstation) and the authentication server (Microsoft IAS or other)
Extensible Authentication Protocol (EAP)
It uses no initialization vector or chaining Identical plaintexts with identical keys encrypt to identical ciphertexts
Electronic Code Book (ECB)
Is a key based technique for encrypting data.
Elliptic-Curve Cryptography (ECC)
Is the method used during the key exchange between the server and the client so that the result is a pre-master secret know to both parties
Elliptical-Curve Diffie-Hellman Ephemera (ECDSA)
Relies on elliptic curves defined over a finite field to generate and verify signatures
Elliptical-Curve Digital Signature Algorithm (ECDSA)
Also referred to as endpoint detection and threat response
Endpoint Detection and Response (EDR)
Provides an added layer of protection by encrypting files or folders on various versions of the Microsoft Windows OS
Encrypted File System (EFS)
Date of an Operating System or Application is the date of which the device will no longer be actively supported
End of Life (EOL)
Occurs when software updates, patches, and other forms of support are no longer offered, resulting in software becoming prone to future security vulnerabilities
End of Service (EOS)
Is a software system that helps you run your entire business, supporting automation and processes in financial, human resources, manufacturing, supply chain, services, procurement, and more
Enterprise Resource Planning (ERP)
Created by the U.S. Federal Communications Commission (FCC) to uniquely identify mobile devices, form the days of AMPS in the United States starting in the early 1980’s
Electronic Serial Number (ESN)
Is a member of the Internet Protocol Security (IPsec) set of protocols that encrypt and authenticate the packets of data between computers using a Virtual Private Network (VPN)
Encapsulating Security Payload (ESP)
All access points within the set broadcast the same SSID to let connected devices recognize others as belongings to the same network
Extended Service Set Identifier (ESSID)
Is a table that informs a computer operating system of the access privileges a user has to a system object, including a single file or a file directory
File System Access Control List (FACL)
A security method for protecting sensitive data at the hardware level by encrypting all data on a disk drive
Full Disk Encryption (FDE)
It examines the integrity of sensitive files, registry keys, and folders within the host operating system and checks whether files have been altered or compromised by tracking logs and comparing the current version to a known baseline
File Integrity Monitoring (FIM)
Semiconductor devices that are based around a matrix of configurable logic blocks (CLBs) connected via programmable interconnects
Field Programmable Gate Array (FPGA)
Probability that the system fails to detect a match between the input fingerprint template and a matching template in the database
False Rejection Rate (FRR)
Is a standard network protocol used for the transfer of files from one host to another over a TCP-based on network, such as the internet
File Transfer Protocol (FTP)
Is a network protocol that enables secure and encrypted file transfers between a client and a server
Secured File Transfer Protocol (FTPS)