Definitions Flashcards

1
Q

IV

A

Initialization Vector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

MFDs

A

Multi-Functional Devices - Print / Scan / Copy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

MMS

A

Multimedia Messaging Service - Extention of SMS / Supports sending multimedia content

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

NIDS

A

Network Based Intrusion Detection System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

MTBF

A

Mean Time Between Failures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

RADIUS

A

Remote Authentication Dial-In User Service - Central authentication service alternatives: TACACS+ and Diameter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

PKI

A

Public Key Infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

PSK

A

Pre-Shared Key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

NIPS

A

Network Based Intrusion Prevention System - Placed in-line or in-band

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

POP3

A

Post Office Protocol Version 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

IMAP4

A

Internet Message Protocol Version 4

Protocol used to store and manage email on servers
TCP 143

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

CSR

A

Certificate Signing Request

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

CTM

A

Counter Mode

Mode of operations used for encryption
Combines an IV with a Counter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

VPN

A

Virtual Private Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

WAF

A

Web Application Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

DLP

A

Data Loss Prevention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

DMZ

A

DeMilitarized Zone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

CHAP

A

Challenge Handshake Authentication Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

DLL

A

Dynamic Link Library

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

SOPs

A

Standard Operating Procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

NAC

A

Network Access Control

Two types - Permanent and Dissolvable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

NAT

A

Network Address Translation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

EAP

A

Extensible Authentication Protocol

Authentication frame work that provides general guidance for authentication methods.

Variations: PEAP, EAP-TLS, EAP–TTLS and EAP-FAST

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

SLE

A

Single Loss Expectancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

SLA

A

Service Level Agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

MDM

A

Mobile Device Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

RAT

A

Remote Access Trojan

Control a system from a remote location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

RC4

A

Rivest Cipher version 4

A symetric stream cipher that can use between 40 and 2,048 bits

Known to be cracked (obsolete)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

DOS

A

Denial of Service

Disk Operating System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

MITM

A

Man in the Middle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

MD5

A

Message Digest 5

Hashing function for integrity
128 bit hashes referred as MD5 checksums

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

HSM

A

Hardware Security Module

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

HVAC

A

Heating Ventilation and Air Conditioning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

MTTR

A

Mean Time To Recover

The time it takes to restore a failed system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

SSL

A

Secure Socket Layer

Predecessor to TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

XOR

A

Logical operation used in some encryption schemes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

XML

A

Extensible Markup Language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

3DES

A

Triple Data Encryption Standard

Symetric Algorithm
Block Cipher
64 bit blocks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

SDN

A

Software Defined Networks

SDN’s separate the data and control planes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

HOTP

A

HMAC Based One Time Password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

WPS

A

WiFi Protected Setup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

RSA

A

Rivest Shamir and Adleman

Asymmetric algorithm used to encrypt data and digitally sign transmissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

WPA2

A

WiFi Protected Access 2

Supports CCMP for encryption which is based on AES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

WPA

A

WiFi Protected Access

Superseded by WPA2
This is obsolete DO NOT USE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

ARP

A

Address Resolution Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

BIOS

A

Basic Input Output System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

RFID

A

Radio Frequency Identification System

RFID Attacks:
Eavesdropping
Replay
DOS (Denial of Service)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

FAR

A

False Acceptance Rate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

SHA

A

Secure Hash Algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

SFTP

A

Secure File Transfer Protocol

Extension of Secure Shell (SSH) used to encrypt FTP traffic.

Transmits data using TCP port 22

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

STP

A

Spanning Tree Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

SMS

A

Short Message Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

AP

A

Access Point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

DH

A

Diffie-Hellman

Asymmetric Algorithm used to privately share symmetric keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

XSS

A

Cross Site Scripting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

TLS

A

Transport Layer Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

FRR

A

False Reject Rate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

RAID

A

Redundant Array of Inexpensive Disks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

BYOD

A

Bring Your Own Device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

SSH

A

Secure Shell

Uses TCP Port 22

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

NTLM

A

New Technology Lan Manager

Suite of protocols that provide confidentiality, integrity and authentication within windows systems.

Versions:
NTLM, NTLMv2 and NTLM2 Session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

FAR

A

False Acceptance Rate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

IaaS

A

Infrastructure as a Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

NDA

A

Non Disclosure Agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

AES

A

Advanced Encryption Standard

Strong symmetric block cipher. Encrypts in 128 bit blocks
Key sizes of 128, 192 or 256

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

ACL’s

A

Access Control Lists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

ISA

A

Interconnect Security Agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

RPO

A

Recovery Point Objective

69
Q

OFDMA

A

Orthogonal Frequency-Division Multiple Access

70
Q

MU-MIMO

A

Multiuser multiple input, multiple output

71
Q

USB OTG

A

Universal Serial Bus On The Go

Cable used to connect mobile devices to other devices

72
Q

UTM

A

Unified Threat Management

73
Q

VDI / VDE

A

Virtual Desktop Infrastructure / Virtual Desktop Environement

74
Q

VLAN

A

Virtual Local Areal Network

75
Q

GPO

A

Group Policy Object

76
Q

ROT-13

A

Rotate 13 letter spaces. A substitution cipher that uses a key of 13

77
Q

DAC

A

Discretionary Access Control

Microsoft NTFS uses this for authorization

78
Q

CYOD

A

Choose Your Own Device

79
Q

FAT AP

A

Fat Access Point

An AP that includes everything needed to connect wireless clients to a wireless network. Configured independantly.

80
Q

PII

A

Personally Identifiable Information

81
Q

GPS

A

Global Positioning System

82
Q

HIDS

A

Host Based Intrusion Detection System

83
Q

SED

A

Self Encrypting Drive

84
Q

IoT

A

Internet of Things

85
Q

SNMPv3

A

Simple Network Management Protocol version 3

86
Q

SIEM

A

Security Information and Event Management

87
Q

RTO

A

Recovery Time Objective

88
Q

PHI

A

Personal Health Information

89
Q

MS-CHAPv2

A

Microsoft Challenge Handshake Authentication Potocol Version 2

Provides mutual authentication. Compare to CHAP and PAP

90
Q

FTPS

A

File Transfer Protocol Secure

Extension of FTP that uses TLS to encrypt FTP traffic
TCP 989 and 990

91
Q

FRR

A

False Rejection Rate

92
Q

AUP

A

Acceptable Use Policy

93
Q

AAA

A

Authentication Authorization and Accounting

94
Q

ECB

A

Electronic Code Book

Legacy Mode of Operations used for encryption. It is weak and should not be used.

95
Q

EAP-TTLS

A

Extensible Authentication Protocol-Tunneled Transport Layer Security

96
Q

EAP-TLS

A

Extensible Authentication Protocol-Transport Layer Security

97
Q

NIST

A

National Institution of Standards and Technology

Part of the Department of Commerce and includes Information Technology Laboratory (ITL)

98
Q

DNSSEC

A

Domain Name System Security Extensions

A suite of extensions to DNS used to protect the integrity of DNS records

99
Q

SSO

A

Single Sign On

100
Q

EMP

A

ElectroMagnetic Pulse

101
Q

EMI

A

ElectroMagnetic Interference

102
Q

CA

A

Certificate Authority

103
Q

Firmware OTA Updates

A

Firmware Over The Air Updates

104
Q

APT

A

Advanced Persistent Threat

105
Q

ALE

A

Annualized Loss Expectancy

Quantitative Risk Assessment

106
Q

AH

A

Authentication Header

IPSEC (authentication and integrity)

107
Q

PEM

A

Privacy Enhanced Mail

A common format for PKI certificates. Can use either CER(ASCII) or DER(Binary). Can be used for almost any types of certificates

108
Q

CER (2)

A

Canonical Encoding Rules / Crossover Error Rate

109
Q

IRP

A

Incident Response Plan

110
Q

DER

A

Distinguished Encoding Rules

Base formation for PKI certificates
Base 64 binary encoded files

111
Q

GCM

A

Galios Counter Mode

Combines counter(CTM) mode with hashing techniques for data authenticity and confidentiality

112
Q

ABAC

A

Attribute Based Access Control

113
Q

EAP-FAST

A

Extensible Authentication Protocol-Flexible Authentication via Secure Tunnel

EAP-FAST supports certificates

114
Q

ESP

A

Encapsulating Security Payload

An option with IPSec to provide confidentiality, integrity and authentication

115
Q

Ephemeral Keys

A

Ephemeral Keys have a very short lifetime

116
Q

FDE

A

Full Disk Encryption

117
Q

PBKDF2

A

Password-Based Key Derivation Function 2

Key stretching technique

118
Q

PAP

A

Password Authentication Protocol

Older authentication protocol where passwords or pins sent across network in clear text

119
Q

S/MIME

A

Secure Multi-Purpose Internet Mail Extensions

120
Q

SoC

A

System on a Chip

Many mobile devices include an SoC

121
Q

DES

A

Data Encryption Standard

Legacy symmetric encryption standard. It has been compromised and AES and 3DES should be used instead.

122
Q

TOTP

A

Time Base One Time Password

123
Q

XSRF

A

Cross Site Request Forgery

Tricks users into performing actions on websites such as making purchases without their knowledge.

124
Q

TPM

A

Trusted Platform Module

TPM (Trusted Platform Module) is a computer chip (microcontroller) that can securely store artifacts used to authenticate the platform (your PC or laptop). These artifacts can include passwords, certificates, or encryption keys.

125
Q

UAVs

A

Unmanned Aerial Vehicles

126
Q

SRTP

A

Secure Real-Time Transport Protocol

RTP is used for audio/video streaming

127
Q

SSID

A

Service Set Identifier

128
Q

NONCE

A

A Number Used Once

Cryptography elements frequently use a none to add randomness

129
Q

UEFI

A

Unified Extensible Firmware Interface

130
Q

TACACS+

A

Terminal Access Controller Access - Control System Plus

Alternative to RADIUS

131
Q

TKIP

A

Temporal Key Integrity Protocol

132
Q

DEP

A

Data Execution Prevention

133
Q

PIV

A

Personal Identity Verification Card

Like our FOB. used by Federal Agencies

134
Q

P7B-PKCS#7

A

PKI Certificates CER Based (ASCII)

Commonly used to share public keys

135
Q

OCSP

A

Online Certification Status Protocol

Alternative to using CRL

136
Q

DSA

A

Digital Signature Algorithm

Encrypted hash of a message used for authentication, non-repudiation and integrity. The senders private key encrypts the hash of the message.

137
Q

HMAC

A

Hash Based Message Authentication Code

Algorithm used to verify integrity and authenticity of a message with the use of a shared secret. Typically combines with another hashing algorithm such as SHA

138
Q

RSTP

A

Rapid Spanning Tree Protocol

improvement of STP to prevent switching loop prolems

139
Q

CASB

A

Cloud Access Security Broker

140
Q

KDC

A

Key Distribution Center

Also knowns as a TGT Server

141
Q

SAML

A

Security Assertion Markup Language

142
Q

RIPEMD

A

Race Integrity Primitives Evaluation Message Digest

Hash function used for integrity. Fixed length hashes of 128,160, 256 or 320 bits

143
Q

Blowfish

A

Symmetric block cipher
64 Bit Blocks
keysize between 32 and 448

144
Q

PFX

A

Personal Information Exchange

Common format for PKI certificates
Predecessor to P12 Certificates

145
Q

BPA

A

Business Partners Agreement

146
Q

CBC

A

Cipher Block Chaining

Used by symmetric encryption ciphers
Uses IV for the first block and each subsequent block is combined with the previous block

147
Q

CCMP

A

Counter Mode with Cipher Block Chaining Message Authentication Code Protocol

Based on AES and used with WPA2 for wireless security

148
Q

ARO

A

Annualized Rate of Occurrence

Quantitative Risk Assessment

149
Q

CAC

A

Common Access Card

Used by Department of Defense

150
Q

NFC

A

Near Field Communication

Allows mobile devices to communicate with nearby mobile devices

151
Q

ICS

A

Industrial Control System

Controls large Systems (Power Plants)
SCADA system controls the ICS

152
Q

PEAP

A

Protected Extensible Authentication Protocol

Extension of EAP used with 802.1x
Requires a certificate on the 802.1x server

153
Q

SCADA

A

Supervisory Control and Data Aquisition

154
Q

LDAPS

A

Lightweight Directory Access Protocol Secure

Encrypts LDAP with TLS

155
Q

LDAP

A

Lightweight Directory Access Protocol

156
Q

SATCOM

A

Satellite Communications

157
Q

SaaS

A

Software as a Service

158
Q

MAC

A

Media Access Control / Mandatory Access Control

159
Q

MOU / MOA

A

Memorandum of Understanding and Memorandum of Agreement

Compare this with ISA

160
Q

DDoS

A

Distributed Denial of Service

161
Q

PaaS

A

Platform as a Service

162
Q

DNS

A

Domain Name System

DNS Poisoning corrupts DNS results. DNSSEC helps prevent DNS poisoning.

163
Q

COPE

A

Company Owned Personally Enabled

164
Q

CRL

A

Certificate Revocation List

165
Q

ROUS

A

Rodents of Unusual Size

Princess Bride

166
Q

RTOS

A

Real Time Operating System

167
Q

RBAC

A

Role Based Access Control

168
Q

RB-RBAC

A

Rule Based Access Control

169
Q

PVC

A

Permanent Virtual Cicuit