Day 7 Flashcards

1
Q

This is a symmetric cipher that is block-oriented, with the key size of 128 bits.

A

IDEA

International Data Encryption Algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The wiring panels linked by risers between floors to perform cross-connection.

A

IDF

Intermediate Distribution Frame

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A service that contain subjects and can perform centralized authentication on behalf of service providers.

A

IdP

Identity Provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A generic term referring to generating alerts four malicious activity.

A

IDS

Intrusion Detection System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The mission of the IEEE is to promote and develop technological advances for the benefit of humanity.

A

IEEE

Institute of Electrical and Electronics Engineers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

This is used prior to IPSEC for the negotiation, exchange and management of symmetric key information.

A

IKE

Internet Key Exchange

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A class of online chat that offers real-time transmission of messages over the Internet and local area networks.

A

IM

Instant Messaging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The archival of information, bit by bit, or sector by sector to alternative media.

A

Image

Drive cloning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

This application listens on TCP/143 and it is clear text form.

A

IMAP4

Internet Message Access Protocol v4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

It moves files to alternative media that have the archive bit set, and then it clears it.

A

Incremental BU

Incremental backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The verification of programmatic input to an application.

A

Input validation

Inspection or sanitation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Artifacts and other forensic data that may be used to identify illicit activity, malware and data breaches.

A

IoC

Indicators of Compromise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A reference to network devices that typically have little defensive capability.

A

IoT

Internet of Things

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A layer 3 system for addressing, fragmenting, reassembly and delivery of datagrams.

A

IP

Internet Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A security measure designed to detect as well as prevent threats from advancing or escalating.

A

IPS

Intrusion Prevention System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Generally considered the most secure remote access protocol.

A

IPSec

Internet Protocol Security

17
Q

Greatly expands the address in space, provides for simplified headers and has hexadecimal addressing.

A

IPv6

Internet Protocol version 6

18
Q

A generic reference to steps to be taken after specific adverse events occur.

A

IR

Incident Response

19
Q

A protocol commonly implemented by helpdesks and Bots.

A

IRC

Internet Relay Chat

20
Q

Devised plans to be implemented upon the manifestation of a specific threat.

A

IRP

Incident Response Plan

21
Q

The agreed-upon measures, settings and protocols taken by two organizations to facilitate communication.

A

ISA

Interconnection Security Agreement

22
Q

A network firewall placed on the intranet to separate two different security zones.

A

ISFW

Internal Segmentation Firewall

23
Q

An international nonprofit organization that develops and publishes standards.

A

ISO

International Organization for Standardization

24
Q

An organization that facilitates access to a worldwide digital network.

A

ISP

Internet Service Provider

25
Q

An organizational role charged with developing, implementing, testing and reviewing IT security.

A

ISSO

Information Systems Security Officer

26
Q

Minimizing risk by identifying threats of the vulnerabilities in the appropriate measures to limit or prevent them.

A

ITCP

IT Contingency Plan

27
Q

This is a random number that augments a secret key to enhance security for a session.

A

IV

Initialization Vector

28
Q

The key server in a Kerberos realm that has access to the keys for all principles.

A

KDC

Key Distribution Center