CompTIA Flashcards
A company stores some employee information in encrypted form, but other public details are stored as plaintext.
Record
writes data to a temporary location before writing the information to the database. If power is lost, the system can recover the last transaction from this when power is restored.
Journaling
high-end cryptographic hardware appliance that can securely store keys and certificates for all devices.
HSM (Hardware Security Module)
used on individual devices to provide cryptographic functions and securely store encryption keys.
TPM (Trusted Platform Module)
a file containing a list of the revoked certificates.
CRL - Certificate Revocation List
Send the public key to be signed
CSR - Certificate Signing Request
T he browser checks for a revoked certificate
OCSP - Online Certificate Status Protocol
Authenticate the server sending an email
SPF - Sender Policy Framework
describes the process of obtaining information from open sources such as social media sites, corporate websites, online forums, and other publicly available locations.
OSINT - Open Source Intelligence
a vulnerability that allows communication between separate VMs.
escape
DKIM
Domain Keys Identified Mail
a broad term describing access control based on a health check or posture assessment. It will deny access to devices that don’t meet the minimum security requirements.
NAC - Network Access Control
MTBF
Mean Time Between Failures
RPO
Recovery Point Objectives
MTTR
Mean Time to Repair
RTO
Recovery Time Objectives
UPS
Uninterruptible Power Supply
commonly used to create a VPN
IPsec
WAF
Web Application Firewall
commonly used to protect against application attacks such as injections, cross-site scripting, and invalid input types.
traps are used to provide alerts and alarms from servers and infrastructure devices
SNMP Traps (Simple Network Management Protocol)
are large industrial systems and usually involve manufacturing equipment or power generation equipment.
ICS (Industrial Control Systems)
This process identifies and reports on the hardware and software installed on the laptop. If this configuration is changed, an alert can be generated.
enumeration
ACL
Access Control List
ARO
Annualized Rate of Occurrence