Day 6 Flashcards

1
Q

Useful for protecting packet data as it has little latency and minimum operation overhead.

A

GCM

Galois Counter Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A law from the European Union that directs protection and privacy of personal information.

A

GDPR

General Data Protection Regulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The free incarnation of a popular cryptosystem, commonly used to secure email.

A

GPG

Gnu Privacy Guard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A feature of Windows that provides centralized management of configuration and settings.

A

GPO

Group Policy Object

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A satellite-based protocol that can closely identify the location or asset.

A

GPS

Global Positioning System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

These processors have an alternate use in discovering keys and cracking.

A

GPU

Graphic Processing Unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An old and standard protocol that inserts one packet within another.

A

GRE

Generic Routing Encapsulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Ensuring that system uptime extends longer than what it normally would.

A

HA

High Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A mass storage system, typically implemented with spinning platters and heads that perform reading and writing.

A

HDD

Hard Disk Drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A defensive application that identifies anomalous or malicious activities within a device.

A

HIDS

Host-based Intrusion Detection System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A defensive application that prevents anomalous or malicious activities within a device.

A

HIPS

Host-based Intrusion Prevention System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Implementing non-repudiation via an exchanged value and hashing.

A

HMAC

Hashed Message Authentication Code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A sophisticated system designed to locate, discover, distract and otherwise observe malicious behavior.

A

Honeynet

Honeypot network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Used to identify and distract hackers.

A

Honeypot

Fake target

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The last line of defense for a system against a malicious intranet host.

A

Host firewall

Software firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

This is a file wherein the system manager may define their own names to resolve IP addresses.

A

Host File

Local resolver

17
Q

Performs authentication by requiring a user to enter a system generated code into a hashing or calculating algorithm that produces a response.

A

HOTP

HMAC-based One-Time Password

18
Q

These key management systems are ideally suited for automated private key transactions that require strong security.

A

HSM

Hardware Security Module

19
Q

A cloud-based service that allows customers to create, manage and implement encryption keys.

A

HSMaaS

Hardware Security Module as a Service

20
Q

The scripting used by browsers to interpret and display content.

A

HTML

Hypertext Markup Language

21
Q

The means by which HTML and images are viewed and accessed by browsers.

A

HTTP

Hypertext Transfer Protocol

22
Q

Performing HTTP over an encrypted channel.

A

HTTPS

Hypertext Transfer Protocol over SSL/TLS

23
Q

The heating, cooling and other environmental aspects of a building.

A

HVAC

Heating, Ventilation and Air Conditioning

24
Q

Implementing cloud-based networks, servers and other infrastructure.

A

IaaS

Infrastructure as a Service

25
Q

The policies, procedures and technologies that facilitate ensuring that only the appropriate personnel have access to resources in an organization.

A

IAM

Identity and Access Management

26
Q

A multifunctional protocol designed to perform network testing and report errors.

A

ICMP

Internet Control Message Protocol

27
Q

Semi-intelligent devices used to control industrial or scientific equipment from central consoles.

A

ICS

Industrial Control Systems