D Flashcards

1
Q

DAC

A

Discretionary Access Control

The creator has all control over an asset and access to it.
The default form of access for Windows.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Data

custodian

A

Facilitates use

Exemplified by data center personnel who manage and
maintain systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Data owner

A

Responsible for use

Determines logical controls, authorizes use and defines
required security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

DBA

A

Database Administrator

This role is filled by personnel capable of managing
automated and large information repositories.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

DDoS

A

Distributed Denial of Service

This attack methodology involves a multitude of
remotely controlled devices focusing upon a single
target.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

DEP

A

Data Execution Prevention

And operating system memory management technique
that prevents user data from overlapping into computer
instructions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

DER

A

Distinguished Encoding Rules

A commonly used method of encoding the data that
makes up the certificate using ASN.1.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

DES

A

Digital Encryption Standard

The first US government standard for symmetric
encryption. It has a 56 bit key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

DHCP

A

Dynamic Host Configuration Protocol

This is an extension of BOOTP and is used to
dynamically allocate IPs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

DHE

A

Diffie-Hellman Ephemeral

This is a key exchange algorithm that enhances
confidentiality by discarding the session keys after use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Dictionary

A

Dictionary attack

Performs hashing or encryption on an array of
predetermined candidate phrases, and compares it to the
secret.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Differential

BU

A

Differential backup

-It backups files to alternative media that have the archive
bit set, and then it does not clear it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

DKIM

A

Domain Keys Identified Mail

A messaging security standard designed to facilitate
non-repudiation between sender and receiver.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

DLL

A

Dynamic Link Library

These files are not directly executed, but are called up
by an application when certain additional functions or
libraries are needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

DLP

A

Data Loss Prevention

Strategies and applications that prevent data theft or
illicit access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

DMARC

A

Domain Message Authentication Reporting
and Conformance

This is an email security standard designed to allow
domains to protect themselves from unauthorized use
and spoofing.

17
Q

DNAT

A

Destination Network Address Translation

The initial destination of a packet as it enters a NAT
system to be redirected to another destination.

18
Q

DMZ

A

Demilitarized Zone

The perimeter area where the outside world may access
certain services.

19
Q

DNS

A

Domain Name Service

An application that handles symbolic name to address
mappings, as well as the reverse.

20
Q

DNSSEC

A

Domain Name System
Security Extensions

An array of tools devised by the IETF to secure DNS
transactions.

21
Q

DoS

A

Denial of Service

A one on one attack that causes access or utility to
cease.

22
Q

DPO

A

Data Protection Officer

A senior officer responsible for an organization’s data
protection strategies and compliance.

23
Q

DRP

A

Disaster Recovery Plan

The immediate plans for recovery of operations or
services in the event of a catastrophic incident.

24
Q

DSA

A

Digital Signature Algorithm

An algorithm created by the NSA to implement non-
repudiation.

25
Q

DSL

A

Digital Subscriber Line

High-speed Internet conductivity based upon existing
infrastructure for telephones.