Day 6 Reversed Flashcards

1
Q

GCM

A

Galois Counter Mode

Useful for protecting packet data as it has little latency and minimum operation overhead.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

GDPR

A

General Data Protection Regulation

A law from the European Union that directs protection and privacy of personal information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

GPG

A

Gnu Privacy Guard

The free incarnation of a popular cryptosystem, commonly used to secure email.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

GPO

A

Group Policy Object

A feature of Windows that provides centralized management of configuration and settings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

GPS

A

Global Positioning System

A satellite-based protocol that can closely identify the location or asset.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

GPU

A

Graphic Processing Unit

These processors have an alternate use in discovering keys and cracking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

GRE

A

Generic Routing Encapsulation

An old and standard protocol that inserts one packet within another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

HA

A

High Availability

Ensuring that system uptime extends longer than what it normally would.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

HDD

A

Hard Disk Drive

A mass storage system, typically implemented with spinning platters and heads that perform reading and writing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

HIDS

A

Host-based Intrusion Detection System

A defensive application that identifies anomalous or malicious activities within a device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

HIPS

A

Host-based Intrusion Prevention System

A defensive application that prevents anomalous or malicious activities within a device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

HMAC

A

Hashed Message Authentication Code

Implementing non-repudiation via an exchanged value and hashing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Honeynet

A

Honeypot Network

A sophisticated system designed to locate, discover, distract and otherwise observe malicious behavior.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Honeypot

A

Fake Target

Used to identify and distract hackers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Host Firewall

A

Software firewall

The last line of defense for a system against a malicious intranet host.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Host File

A

Local resolver

This is a file wherein the system manager may define their own names to resolve IP addresses.

17
Q

HOTP

A

HMAC-based One-Time Password

Performs authentication by requiring a user to enter a system generated code into a hashing or calculating algorithm that produces a response.

18
Q

HSM

A

Hardware Security Module

These key management systems are ideally suited for automated private key transactions that require strong security.

19
Q

HSMaaS

A

Hardware Security Module as a Service

A cloud-based service that allows customers to create, manage and implement encryption keys.

20
Q

HTML

A

Hypertext Markup Language

The scripting used by browsers to interpret and display content.

21
Q

HTTP

A

Hypertext Transfer Protocol

The means by which HTML and images are viewed and accessed by browsers.

22
Q

HTTPS

A

Hypertext Transfer Protocol over SSL/TLS

Performing HTTP over an encrypted channel.

23
Q

HVAC

A

Heating, Ventilation and Air Conditioning

The heating, cooling and other environmental aspects of a building.

24
Q

IaaS

A

Infrastructure as a Service

Implementing cloud-based networks, servers and other infrastructure.

25
Q

IAM

A

Identity and Access Management

The policies, procedures and technologies that facilitate ensuring that only the appropriate personnel have access to resources in an organization.

26
Q

ICMP

A

Internet Control Message Protocol

A multifunctional protocol designed to perform network testing and report errors.

27
Q

ICS

A

Industrial Control Systems

Semi-intelligent devices used to control industrial or scientific equipment from central consoles.