Day 11 COPY Flashcards

1
Q

A nongovernmental security standard that regulates the implementation and security of web payment gateways.

A

PCI DSS

Payment Card Industry Data Security Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

This is a multiple output device that regulates the power supply and its quality to multiple devices within a rack of devices in a data center.

A

PDU

Power Distribution Unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

This is a format for code run by Windows systems and 32 or 64 bit mode.

A

PE

Portable Executable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An EAP form that sends MSCHAP credentials secured within a TLS envelope.

A

PEAP

Protected Extensible Authentication Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Small electronics, such as beepers, calendars and note applications used prior to smartphones.

A

PED

Portable Electronic Device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

This is one of the oldest formats of certificates and uses Base64.

A

PEM

Privacy-enhanced Electronic Mail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

This is the property of Key management where in the loss of one key is not in danger data encrypted with earlier session keys.

A

PFS

Perfect Forward Secrecy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A binary format for storing or sending server certificates and private keys.

A

PFX

Personal Exchange Format

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A widely used cryptosystem initially used for securing email by encryption and digital signatures.

A

PGP

Pretty Good Privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Typically sensitive information regarding the health of an individual.

A

PHI

Personal Health Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Bogus messaging sent to a wide array of potential targets.

A

Phishing

Malicious Spam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

This is data or pieces of data that uniquely correspond to or identify one individual and requires special handling.

A

PII

Personally Identifiable Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Knowledge-based authentication using a single value or number.

A

PIN

Personal Identification Number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

An identification card that contains a photograph, RFID, barcode, and cryptographically stored PKI information.

A

PIV

Personal Identity Verification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Gaining control of one application or host in order to manipulate a secondary target.

A

Pivot

Staging New Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Public-key encryption standards developed by RSA Security.

A

PKCS

Public Key Cryptography Standards

17
Q

The processes and management associated with the identification and validation of certificates and public keys.

A

PKI

Public Key Infrastructure

18
Q

An implementation of an idea or theory that establishes its validity commonly associated with vulnerabilities and exploits.

A

PoC

Proof of Concept

19
Q

An attack technique that could subvert confidentiality in an SSL connection.

A

POODLE

Padding Oracle on Downgrade Legacy Encryption

20
Q

This protocol listens on TCP/110 and downloads messages from the server.

A

POP

Post Office Protocol

21
Q

Performing address and host discovery, along with identifying listening applications.

A

Port Scan

Network mapping and Service Enumeration

22
Q

The old form of telephony that implemented dedicated copper connections vs. packet advised voice transmission.

A

POTS

Plain Old Telephone Service

23
Q

This is a layer 2 technology implemented to facilitate communication between endpoints or routers.

A

PPP

Point-to-Point Protocol

24
Q

A largely deprecated protocol used for establishing tunnels and securing packet ice communication.

A

PPTP

Point-to-Point Tunneling Protocol

25
Q

Managing key establishment and management by using pre-established relationships and non-automatic exchange methods.

A

PSK

Pre-shared Key

26
Q

Defined by policy, this is software that provides functionality in violation of authorized use.

A

PUP

Potentially Unwanted Program