Day 12 COPY Flashcards

1
Q

The property of a camera to be able to swivel in various directions on demand.

A

PTZ

Pan-Tilt-Zoom

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The monitoring and control function an organization that identifies, prevents or corrects errors in processes, procedures or products.

A

QA

Quality Assurance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A networking function that seeks to reserve bandwidth in order to preserve the timing and availability of communication, especially as it pertains to multimedia.

A

QoS

Quality of Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The party in PKI who is capable of obtaining a private key locked away in escrow.

A

RA

Recovery Agent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

This is the entry point of a subject into PKI. It is here that a party establishes and verifies identity before obtaining keys.

A

RA

Registration Authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A model of application development that very quickly works through the development phases.

A

RAD

Rapid Application Development

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The most common centralized authentication service.

A

RADIUS

Remote Authentication Dial-in User Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A set of standards that specify varying levels of fault tolerance, performance and system requirements for hard drive data storage.

A

RAID

Redundant Array of Inexpensive Disks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

This is a form of storage that allows specific and independent access to information and does not require a sequential read or write.

A

RAM

Random Access Memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A Microsoft specific term that relates to servers that facilitate modem-based access to an intranet.

A

RAS

Remote Access Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Requires payment for return of information.

A

Ransomware

Cryptovirology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Software that implements illicit remote control software.

A

RAT

Remote Access Trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A model of access regulation commonly used for firewalls and physical controls.

A model of access control, typically implemented in an inverted tree, where rights float down.

A

RBAC

Role-based Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A now deprecated encryption algorithm used by SSL and WEP.

A

RC4

Rivest Cipher version 4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

This is designed to become a successor to SMS messaging that provides communication between phones and carriers.

A

RCS

Rich Communication Services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Allows access to a system for remote management and help desk operations.

A

RDP

Remote Desktop Protocol

17
Q

Documents that are largely specifications and definitions for entities on the Internet.

A

RFC

Request for Comments

18
Q

This is a common choice for tracking small devices and objects, as well as doorway access control.

A

RFID

Radio Frequency Identifier

19
Q

This is a hashing algorithm.

A

RIPEMD

RACE Integrity Primitives Evaluation Message Digest

20
Q

This risk management paradigm was promulgated by the US government.

A

RMF

Risk Management Framework

21
Q

This is the primary metric to be used when evaluating whether something is worth the time, effort or cost.

A

ROI

Return on Investment

22
Q

Implemented by an attacker to prevent discovery or observation of activities.

A

Rootkit

Enables and hides access

23
Q

A metric that identifies the number of transactions or quantity of data that can be acceptably lost.

A

RPO

Recovery Point Objective

24
Q

This algorithm relies on factoring large prime numbers.

A

RSA

Rivest, Shamir, & Adleman

25
Q

A metric that identifies the maximum amount of time allowed for an outage.

A

RTO

Recovery Time Objective

26
Q

Cisco term that refers to a filtering technique that dumps unwanted traffic prior to being received in the target network.

A

RTBH

Remotely Triggered Black Hole