Day 10 COPY Flashcards

1
Q

This protocol is used by the client to validate the status of a received certificate.

A

OCSP

Online Certificate Status Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

This is a value, commonly associated with SNMP that is used to identify aspects of a managed device or system.

A

OID

Object Identifier

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The software on a system initially loaded that regulates access to resources and facilitates the execution of applications.

A

OS

Operating System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A seven layer scheme that identifies commonly implemented features involved in networked applications and systems.

A

OSI

Open Systems Interconnection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Accessing data stores of information that enable one to collect, analyze and discern useful information from publicly available resources.

A

OSINT

Open-source Intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An open standard routing protocol capable of dynamic routing and the secure transfer of routing table information.

A

OSPF

Open Shortest Path First

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Associated with industrial controls and processes, this refers to systems that identify changes, perform monitoring and control industrial equipment resources.

A

OT

Operational Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A general technology category of systems that use wireless and cellular means to obtain new data or updates.

A

OTA

Over The Air

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A technical specification for USB devices that allow them to act as hosts and facilitate connections from other USB devices, such as mice and keyboards.

A

OTG

On-The-Go

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Implement the authentication with a secret that expires upon initial access.

A

OTP

One-time Password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Involves a key that is as long as the message, but may only be used once.

A

OTP

One-time Pad

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A derivative of the SCAP program to automate vulnerability detection and management.

A

OVAL

Open Vulnerability Assessment Language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A nonprofit international organization that facilitates education, secure development, documentation, tools and other technologies to enhance web applications.

A

OWASP

Open Web Application Security Project

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

This format allows for the storage of both public and private keys in open or encrypted form.

A

P12

PKCS #12

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A headless file sharing system that has no centralized point of control and facilitates wide-open file sharing.

A

P2P

Peer to Peer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A form of access that allows an organization to create and run its own applications on the cloud.

A

PaaS

Platform as a Service

17
Q

A JavaScript based technology that regulates the configuration of browsers and their use of web proxies.

A

PAC

Proxy Auto Configuration

18
Q

Dynamically, loadable authentication libraries used on Linux.

A

PAM

Pluggable Authentication Modules

19
Q

This is an insecure authentication protocol, sometimes used between routers.

A

PAP

Password Authentication Protocol

20
Q

Address translation that multiplexes many internal addresses through one or a few external address, linking connections based upon the source port.

A

PAT

Port Address Translation

21
Q

An application designed to identify compliance deviations and variance from a baseline, and then rectify it.

A

Patch Management

Configuration and baseline maintenance

22
Q

This cryptographic function, processes, and otherwise insecure secret through repeated rounds of hashing to create a longer key value.

A

PBKDF2

Password-based Key Derivation Function 2

23
Q

The point of interface between the public switched telephone network and an organization’s internal telephony.

A

PBX

Private Branch Exchange

24
Q

Sniffing and recording network data into a file for later analysis.

A

PCAP

Packet Capture