Day 5 Reversed Flashcards

1
Q

DSA

A

Digital Signature Algorithm

An algorithm created by the NSA to implement non-repudiation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

DSL

A

Digital Subscriber Line

High-speed Internet conductivity based upon existing infrastructure for telephones.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

EAP

A

Extensible Authentication Protocol

A derivative of PPP used by wired and wireless networks to validate connections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ECB

A

Electronic Code Book

A mode of symmetric encryption that divides the message into each block and encrypts them separately.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

ECC

A

Elliptic Curve Cryptography

An algorithm commonly used for key exchange that relies upon geometric complexities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

ECDHE

A

Elliptic Curve Diffie-Hellman Ephemeral

Used to negotiate a temporary shared secret using a public and private key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

ECDSA

A

Elliptic Curve Digital Signature Algorithm

This signing technique employs the complexities of geometry, instead of factoring prime numbers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

EDR

A

Endpoint Detection and Response

An intranet technology designed to protect access to the infrastructure, identify threats and quarantine known offenders.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

EF

A

Exposure Factor

Typically referenced as a percentage value indicating value lost from one attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

EFS

A

Encrypted File System

A cryptosystem built into Microsoft that allows selective encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

EIP

A

Extended Instruction Pointer

A programming concept that points an application to the bottom or next step in execution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

EMI

A

Electromagnetic Interference

Typically associated with accidental radiation of signals that interfere with IT systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

EMP

A

Electro Magnetic Pulse

Large and significant discharge of signals that can create a denial of service in transmission and storage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

EOL

A

End of Life

This term identifies when a product has reached the end of its useful life according to the vendor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

EOSL

A

End of Service Life

This term identifies when a product has reached the end of its useful life and is no longer patched or fixed or maintained.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

ERP

A

Enterprise Resource Planning

Business process management integrated into multiple aspects of an organization, IT Services, and Human Resources.

17
Q

ESP

A

Encapsulated Security Payload

A header used in IPSEC to create confidentiality.

18
Q

ESN

A

Electronic Serial Number

An identifying number created by the Federal Communications Commission to uniquely identify mobile devices and radios.

19
Q

FACL

A

File System Access Control List

This is creating filters or restrictions on disk storage.

20
Q

FAR

A

False Acceptance Rate

When biometrics malfunction, incorrectly granting permissions.

21
Q

FDE

A

Full Disk Encryption

Enforcing confidentiality across the entire storage device.

22
Q

FIM

A

File Integrity Monitoring

A defensive control designed to assess or validate the integrity of files, such as Tripwire.

23
Q

FPGA

A

Field Programmable Gate Array

An integrated circuit or chip that may be revised or configured after manufacture.

24
Q

FRR

A

False Rejection Rate

A biometric measurement, indicating the rate at which authorized personnel are forbidden access.

25
Q

FTP

A

File Transfer Protocol

A file management application designed to insecurely upload and download files.

26
Q

FTPS

A

File transfer Protocol - Secure

A relative of HTTPS implemented in the same way with certificates and key exchange.

27
Q

Full BU

A

Full Backup

It moves files to alternative media that regardless of whether the archive bit is set, and then it clears it.