Day 13 COPY Flashcards

1
Q

These are operating systems that work in real-time, such as manufacturing and robotics.

A

RTOS

Real-time Operating System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

One of several protocols used for telephony/audio/video.

A

RTP

Real-time Transport Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The standard form of messaging with encryption or digital signatures that requires public and private keys.

A

S/MIME

Secure/Multipurpose Internet Mail Extensions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A minimal cloud asset that allows access to one application or port.

A

SaaS

Software as a Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Based upon Dragonfly, this key management system incorporates elements of Diffie Hellman and is a part of WPA3.

A

SAE

Simultaneous Authentication of Equals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A method of exchanging credentials via a trusted authentication service.

A

SAML

Security Assertions Markup Language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A remote file system access via Internet-based protocols.

A

SAN

Storage Area Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Embedding multiple names for server within a single certificate.

A

SAN

Subject Alternative Name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Industrial controls automation the network-based management systems that control many remote, small, embedded devices.

A

SCADA

System Control and Data Acquisition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

This is a framework promoted by the US government to create open standards for the automation of information assurance.

A

SCAP

Security Content Automation Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

This is a technology that is highly resistant to dictionary attacks and is designed to replace Pre-shared Keys and WPA2-Personal.

A

SCEP

Simple Certificate Enrollment Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A command line application that will securely upload or download files to work from a remote host.

A

SCP

Secure Copy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A host bus interface to connect to multiple hard drives.

A

SCSI

Small Computer System Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Tools, APIs and applications created by a vendor to allow development and customization.

A

SDK

Software Development Kit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The sequence of processes involved in the creation and management of software.

A

SDLC

Software Development Life Cycle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The stages or phases of a software-based application as it goes from inception to maintenance.

A

SDLM

Software Development Life-cycle Methodology

17
Q

Using virtualization to create, manage and secure networks between various systems.

A

SDN

Software Defined Network

18
Q

The elements that provide service delivery, session management and other key components to a client.

A

SDP

Service Delivery Platform

19
Q

The capability implemented with software that allows for the organization to closely inspect network traffic from an array of collectors and sensors.

A

SDV

Software-defined Visibility

20
Q

Storage devices that are capable of implementing high-grade encryption without additional software or resources.

A

SED

Self-Encrypting Drives

21
Q

This is the facility within Windows that identifies memory corruption and contingencies.

A

SHE

Structured Exception Handler

22
Q

This application runs over TCP/22 and encrypts control and data functions.

A

SFTP

Secured File Transfer Protocol

23
Q

A now deprecated hashing algorithm that has been in very common use.

A

SHA

Secure Hashing Algorithm

24
Q

These servers collect, aggregate and analyze data from multiple sources to identify threats and dangerous trends.

A

SIEM

Security Information and Event Management

25
Q

An integrated circuit that identifies a phone and subscriber.

A

SIM

Subscriber Identity Module

26
Q

This is used to signal, start up, maintain and terminate real-time communication services between endpoints using Internet protocol.

A

SIP

Session Initiation Protocol