Day 5 Flashcards

1
Q

An algorithm created by the NSA to implement non-repudiation.

A

DSA

Digital Signature Algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

High-speed Internet conductivity based upon existing infrastructure for telephones.

A

DSL

Digital Subscriber Line

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A derivative of PPP used by wired and wireless networks to validate connections.

A

EAP

Extensible Authentication Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A mode of symmetric encryption that divides the message into each block and encrypts them separately.

A

ECB

Electronic Code Book

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An algorithm commonly used for key exchange that relies upon geometric complexities.

A

ECC

Elliptic Curve Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Used to negotiate a temporary shared secret using a public and private key.

A

ECDHE

Elliptic Curve Diffie-Hellman Ephemeral

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

This signing technique employs the complexities of geometry, instead of factoring prime numbers.

A

ECDSA

Elliptic Curve Digital Signature Algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An intranet technology designed to protect access to the infrastructure, identify threats and quarantine known offenders.

A

EDR

Endpoint Detection and Response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Typically referenced as a percentage value indicating value lost from one attack.

A

EF

Exposure Factor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A cryptosystem built into Microsoft that allows selective encryption.

A

EFS

Encrypted File System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A programming concept that points an application to the bottom or next step in execution.

A

EIP

Extended Instruction Pointer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Typically associated with accidental radiation of signals that interfere with IT systems.

A

EMI

Electromagnetic Interference

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Large and significant discharge of signals that can create a denial of service in transmission and storage.

A

EMP

Electro Magnetic Pulse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

This term identifies when a product has reached the end of its useful life according to the vendor.

A

EOL

End of Life

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

This term identifies when a product has reached the end of its useful life and is no longer patched or fixed or maintained.

A

EOSL

End of Service Life

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Business process management integrated into multiple aspects of an organization, IT Services, and Human Resources.

A

ERP

Enterprise Resource Planning

17
Q

A header used in IPSEC to create confidentiality.

A

ESP

Encapsulated Security Payload

18
Q

An identifying number created by the Federal Communications Commission to uniquely identify mobile devices and radios.

A

ESN

Electronic Serial Number

19
Q

This is creating filters or restrictions on disk storage.

A

FACL

File System Access Control List

20
Q

When biometrics malfunction, incorrectly granting permissions.

A

FAR

False Acceptance Rate

21
Q

Enforcing confidentiality across the entire storage device.

A

FDE

Full Disk Encryption

22
Q

A defensive control designed to assess or validate the integrity of files, such as Tripwire.

A

FIM

File Integrity Monitoring

23
Q

An integrated circuit or chip that may be revised or configured after manufacture.

A

FPGA

Field Programmable Gate Array

24
Q

A biometric measurement, indicating the rate at which authorized personnel are forbidden access.

A

FRR

False Rejection Rate

25
Q

A file management application designed to insecurely upload and download files.

A

FTP

File Transfer Protocol

26
Q

A relative of HTTPS implemented in the same way with certificates and key exchange.

A

FTPS

File transfer Protocol - Secure

27
Q

It moves files to alternative media that regardless of whether the archive bit is set, and then it clears it.

A

Full BU

Full backup