Domain 4 Flashcards

1
Q

Application programming interface or API

A

A set of routines standards or protocols and tools for building software applications to access a web-based software application or web tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Bit

A

The most essential representation of data parentheses 0 or 1 ( at layer 1 of the open systems interconnection or OSI model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Broadcast

A

Broadcast transmission is a one too many or one to everyone form of sending internet traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Byte

A

The byte is a unit of digital information that most commonly consists of 8 Bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Cloud computing

A

A model for enabling ubiquitous convenient on demand network access to a shared pool of configurable computing resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Community cloud

A

A system in which the cloud infrastructure is provisioned for exclusive use by a specific community of consumers from organizations that have shared concerns

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

D encapsulation

A

The opposite process of ncapsulation in which bundles of data are unpacked or revealed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Denial of service

A

The prevention of authorized access to resources or the delaying of time critical operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Domain name service or DNS

A

This Acronym can be applied to three interrelated elements a service, a physical server and a network protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Encapsulation

A

Enforcement of data hiding and code hiding during All Phases of software development and operational use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Encryption

A

The process and act of converting the message from its plain text to ciphertext sometimes it is also referred to as inciphering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

File transfer protocol or FTP

A

The Internet Protocol and program used to transfer files between hosts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Fragment attack

A

In a fragment attack, an attacker fragments traffic in such a way that a system is unable to put data packets back together

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Hardware

A

The physical parts of a computer and related devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Hybrid cloud

A

A combination of public cloud storage and private cloud storage or some critical data resides in the Enterprise’s private cloud while other data is stored and accessible from a public cloud storage provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Infrastructure as a service or iaas

A

The provider of the core computing, storage and network hardware and software that is the foundation upon which organizations can build and then deploy applications. Iaas is popular in the data center where software and servers are purchased as a fully outsourced service and usually build on usage and how much of the resource is used

17
Q

Internet control message protocol or icmp

A

An IP network protocol standardized by the internet engineering task force or ietf through rfc792 to determine if a particular service or host is available

18
Q

Internet Protocol or ipv4

A

Standard protocol for transmission of data from source to destinations in packet switched Communications networks and interconnected systems of such Networks

19
Q

Man in the middle

A

An attack where the adversary positions himself in between the user and the system so that he can intercept and alter data traveling between them

20
Q

Microsegmentation

A

Part of a zero trust strategy that breaks Lans into very small highly localized zones using firewalls or similar technologies. At the limit, this place is firewall at every connection point

21
Q

Oversized packet attack

A

Purposely sending a network packet that is larger than expected or larger than can be handled by the receiving system, causing the receiving system to fail unexpectedly

22
Q

Packet

A

Representation of data at layer 3 of the open systems interconnection or OSI model

23
Q

Payload

A

The primary action of a malicious code attack

24
Q

Payment card industry data security standard or pcidss

A

An information security standard administered by the payment card industry security standards Council that applies to Merchants and service providers who process credit or debit card transactions

25
Q

Platform as a service or paas

A

The web authoring or application development middleware environment that allows applications to be built in the cloud before they’re deployed as saas assets

26
Q

Private cloud

A

The phrase used to describe a cloud computing platform that is implemented within the corporate firewall, under the control of the it department. A private cloud is designed to offer the same features and benefits of cloud systems, but removes a number of objections to the cloud computing model, including control over Enterprise and customer data, worries about security, and issues connected to Regulatory Compliance

27
Q

Protocols

A

A set of rules formats and procedures to implement and control some type of Association or communication between systems

28
Q

Public cloud

A

The cloud infrastructure is provisioned for open use by the general public it may be owned managed and operated by a business or government organization or some combination it exists on the premises of the cloud provider

29
Q

Simple mail transport protocol or SMTP

A

The standard communication protocol for sending and receiving emails between senders and receivers

30
Q

Software

A

Computer programs and Associated data that may be dynamically written or modified during execution

31
Q

Software as a service

A

The cloud customer uses the cloud provisioners applications running within a cloud infrastructure. The applications are accessible from various client devices through either A Thin Client interface, such as a web browser or a program interface.

32
Q

Spoofing

A

Faking the sending address of a transmission to gain illegal entry into a secure system

33
Q

Transport control protocol / Internet Protocol or tcp/ip model

A

Internet working protocol model created by the ietf, which specifies four layers of functionality which is the link layer of physical Communications internet layer Network to network communication, transport layer which is basic channels for connections and connection list exchange of data between hosts

34
Q

VLAN

A

A virtual local area network or VLAN is a logical group of workstations servers and network devices that appear to be on the same Lan despite their geographical distribution

35
Q

VPN

A

A virtual private Network or vpn, built on top of existing networks, that can provide a secure Communications mechanism for transmission between Networks

36
Q

WLAN

A

A wireless area network or WLAN is a group of computers and devices that are located in the same vicinity, forming a network based on radio Transmissions rather than wired connections. A Wi-Fi network is a type of WLAN

37
Q

Zenmap

A

The graphical user interface or GUI for the nmap security scanner, and open source application that scans networks to determine everything that is connected as well as other information

38
Q

Zero trust

A

Removing the design belief that the network has any trusted space. Security is managed at each possible level, representing the most granular asset micro-segmentation of workloads is a tool of the model