Day 8 Flashcards

1
Q

Protects a private or secret key from unauthorized access or disclosure.

A

KEK

Key Encryption Key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Filter and forward data at the MAC layer.

A

L2 Device

Switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Supports VPN site to site connections but does not encrypt.

A

L2TP

Layer 2 Tunneling Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

This is an infrastructure device that interconnects networks and can span different technologies.

A

L3 Device

Router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A network composed of relatively short-range protocols that facilitate swift transfer of information.

A

LAN

Local Area Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

This is a protocol designed to work with AD or NDS information from a tree.

A

LDAP

Lightweight Directory Access Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Commonly integrated with Cisco systems to facilitate centralized authentication.

A

LEAP

Lightweight Extensible Authentication Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A category of malicious activity, wherein an authorized user adds unwanted instructions.

A

Logic Bomb

Insider alteration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The staging of general purpose or security management systems on the cloud that manage local agent-based systems.

A

MaaS

Monitoring as a Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

This is typified by a network interface card, along with its unique burned in identifying number.

A

MAC

Media Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A strict form of access control that prevents subjects from accessing objects above their security level.

A

MAC

Mandatory Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A small piece of information sent along with a message that validates the sender.

A

MAC

Message Authentication Code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Management software designed to allow an enterprise to maintain control over its mobile devices, smart phones and tablets.

A

MAM

Mobile Application Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A general description of a technology that allows access across entire municipal areas.

A

MAN

Metropolitan Area Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

An access point to a physical organization designed to regulate inbound and outbound access.

A

Mantrap

Screening area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A pointer to an area on the disk where initial loading information is stored.

A

MBR

Master Boot Record

17
Q

One of the oldest hashing algorithms.

A

MD5

Message Digest 5

18
Q

This is the centralized connection point between intermediate distribution frames and the outside world.

A

MDF

Main Distribution Frame

19
Q

Software that centrally controls the security aspects and configuration of smart phones.

A

MDM

Mobile Device Management

20
Q

Requiring the use of two or more of location, something you know, have, are or do.

A

MFA

Multi-Factor Authentication

21
Q

Office equipment, typically a printer, that is able to fax, photocopy and scan documents.

A

MFD

Multifunction Device

22
Q

A printer that can fax, photocopy and scan documents.

A

MFP

Multifunction Printer

23
Q

An attacker insinuates itself between a client and a server, observing or modifying communication.

A

MITM

Man-in-the-Middle

24
Q

On-Path attack wherein a node listens to and takes over a conversation by insinuating itself in the stream of communication.

A

MITM

Man in the middle

25
Q

A component of artificial intelligence that enables a system to learn, adapt and improve based upon inputs without having to be reprogrammed.

A

ML

Machine Learning

26
Q

A protocol intended to facilitate multimedia transfer over SMS.

A

MMS

Multimedia Message Service

27
Q

This is a document that describes the cooperative work to be taken together by two parties toward an objective.

A

MOA

Memorandum of Agreement

28
Q

This provides terms and details necessary for two
parties to work together.

A

MOU

Memorandum of Understanding