D Flashcards

1
Q

DBA

A

Database Administrator

The individual responsible for maintaining and securing databases that store, protect, and allow users to query data. They also ensure that data is correctly stored and retrieved, and that users can easily access the information they need.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

DAC

A

Discretionary Access Control

A cybersecurity system that allows the owner of a resource to control who can access it and what level of access they have

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

DDoS

A

Distributed Denial of Service

A cyberattack where the attacker attempts to disrupt a server, network, or service by flooding it with internet traffic from multiple sources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

DEP

A

Data Execution Prevention

A security feature that monitors and protects certain pages/regions of memory, preventing them from executing (usually malicious) code. This works by marking some data regions as non-executable by default, making it harder for attacks to use buffer overflows and other malware execution techniques.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

DES

A

Digital Encryption Standard

A symmetric block cipher with a 56-bit key. This is a short key and too insecure for modern applications, but has been helpful for the advancement of cryptography.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

DHCP

A

Dynamic Host Configuration Protocol

A networking protocol that automatically assigns private IP addresses and other network configurations to devices when they connect to a network. The address is assigned by a DHCP server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

DHE

A

Diffie-Hellman key Exchange

A key exchange protocol that enables two parties, who have had no prior knowledge of each other, securely establish a mutual secret over an insecure channel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

DKIM

A

DomainKeys Identified Mail

An email security standard that uses digital signatures to verify that an email was sent and an authorized email server.

Admins can use this to list email servers that are authorized to send mail on the organization’s behalf. Also, a mail server receiving mail will use it to check the aforementioned list to see if the message was indeed sent by an authorized server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

DLL

A

Dynamic Link Library

A library used by Microsoft OSs that allows multiple applications to share code and other resources simultaneously. These resources include images and executable functions that complete specific tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

DLP

A

Data Loss Prevention

A cybersecurity solution that helps organizations prevent and detect data breaches, leaks, and misuse. Includes a combination of people, processes, and technology to protect sensitive data and ensure compliance with regulations.

This software can send alerts when sensitive information is downloaded, and detects when that data is leaving the network (via an email, dropbox, etc).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

DMARC

A

Domain Message Authentication, Reporting, and Conformance

An email security protocol that determined the disposition of emails that cannot be authenticated. It determines whether they’re reported, marked as spam, deleted, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

DNAT

A

Destination Network Address Translation

A NAT technique that changes the destination address of a routed packet and performs the reverse function for replies.

Typically used when connecting from a public network to a private network. (The opposite from how NAT is normally used)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

DNS

A

Domain Name System

The phonebook of the internet. This system translates domain names into IP addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

DoS

A

Denial of Service

A cyberattack where the attacker attempts to disrupt a server, network, or service by flooding it with internet traffic from a single source.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

DPO

A

Data Privacy Officer

An individual responsible for ensuring that an organization handles personal data in compliance with data protection laws. This includes the data of customers, staff, providers, and other individuals.

They are also responsible for training other employees on data privacy compliance and conducting regular security audits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

DRP

A

Disaster Recovery Plan

A set of procedures and strategies that help organizations to prepare for, respond to, and recover form cyber security incidents.

17
Q

DSA

A

Digital Signature Algorithm

A public key cryptosystem used to generate digital signatures, authenticate the sender of a digital message, and prevent message tampering.

18
Q

DSL

A

Digital Subscriber Line

A modem technology that uses existing telephone lines to transport high-bandwidth data to service subscribers. It provides dedicated, point-to-point public network access.