Day 7 Reversed Flashcards

1
Q

IDEA

A

International Data Encryption Algorithm

This is a symmetric cipher that is block-oriented, with the key size of 128 bits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

IDF

A

Intermediate Distribution Frame

The wiring panels linked by risers between floors to perform cross-connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

IdP

A

Identity Provider

A service that contain subjects and can perform centralized authentication on behalf of service providers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

IDS

A

Intrusion Detection System

A generic term referring to generating alerts four malicious activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

IEEE

A

Institute of Electrical and Electronics Engineers

The mission of the IEEE is to promote and develop technological advances for the benefit of humanity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

IKE

A

Internet Key Exchange

This is used prior to IPSEC for the negotiation, exchange and management of symmetric key information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

IM

A

Instant Messaging

A class of online chat that offers real-time transmission of messages over the Internet and local area networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Image

A

Drive Cloning

The archival of information, bit by bit, or sector by sector to alternative media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

IMAP4

A

Internet Message Access Protocol v4

This application listens on TCP/143 and it is clear text form.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Incremental BU

A

Incremental Backup

It moves files to alternative media that have the archive bit set, and then it clears it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Input Validation

A

Inspection or Sanitation

The verification of programmatic input to an application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

IoC

A

Indicators of Compromise

Artifacts and other forensic data that may be used to identify illicit activity, malware and data breaches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

IoT

A

Internet of Things

A reference to network devices that typically have little defensive capability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

IP

A

Internet Protocol

A layer 3 system for addressing, fragmenting, reassembly and delivery of datagrams.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

IPS

A

Intrusion Prevention System

A security measure designed to detect as well as prevent threats from advancing or escalating.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

IPSec

A

Internet Protocol Security

Generally considered the most secure remote access protocol.

17
Q

IPv6

A

Internet Protocol version 6

Greatly expands the address in space, provides for simplified headers and has hexadecimal addressing.

18
Q

IR

A

Incident Response

A generic reference to steps to be taken after specific adverse events occur.

19
Q

IRC

A

Internet Relay Chat

A protocol commonly implemented by helpdesks and Bots.

20
Q

IRP

A

Incident Response Plan

Devised plans to be implemented upon the manifestation of a specific threat.

21
Q

ISA

A

Interconnection Security Agreement

The agreed-upon measures, settings and protocols taken by two organizations to facilitate communication.

22
Q

ISFW

A

Internal Segmentation Firewall

A network firewall placed on the intranet to separate two different security zones.

23
Q

ISO

A

International Organization for Standardization

An international nonprofit organization that develops and publishes standards.

24
Q

ISP

A

Internet Service Provider

An organization that facilitates access to a worldwide digital network.

25
Q

ISSO

A

Information Systems Security Officer

An organizational role charged with developing, implementing, testing and reviewing IT security.

26
Q

ITCP

A

IT Contingency Plan

Minimizing risk by identifying threats of the vulnerabilities in the appropriate measures to limit or prevent them.

27
Q

IV

A

Initialization Vector

This is a random number that augments a secret key to enhance security for a session.

28
Q

KDC

A

Key Distribution Center

The key server in a Kerberos realm that has access to the keys for all principles.