E Flashcards

1
Q

EAP

A

Extensible Authentication Protocol

A derivative of PPP (Point-to-Point Protocol) used by wired and wireless
networks to validate connections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ECB

A

Electronic Code Book

A mode of symmetric encryption that divides the
message into each block and encrypts them separately.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ECC

A

Elliptic Curve Cryptography

An algorithm commonly used for key exchange that
relies upon geometric complexities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ECDHE

A

Elliptic Curve Diffie-Hellman Ephemeral

Used to negotiate a temporary shared secret using a
public and private key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

ECDSA

A

Elliptic Curve Digital Signature Algorithm

This signing technique employs the complexities of
geometry, instead of factoring prime numbers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

EDR

A

Endpoint Detection and Response

An intranet technology designed to protect access to the
infrastructure, identify threats and quarantine known
offenders.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

EF

A

Exposure Factor

Typically referenced as a percentage value indicating
value lost from one attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

EFS

A

Encrypted File System

A cryptosystem built into Microsoft that allows
selective encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

EIP

A

Extended Instruction Pointer

A programming concept that points an application to the
bottom or next step in execution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

EMI

A

Electromagnetic Interference

Typically associated with accidental radiation of signals
that interfere with IT systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

EMP

A

Electro Magnetic Pulse

Large and significant discharge of signals that can
create a denial of service in transmission and storage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

EOL

A

End of Life

This term identifies when a product has reached the end
of its useful life according to the vendor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

EOSL

A

End of Service Life

This term identifies when a product has reached the end
of its useful life and is no longer patched or fixed or
maintained.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

ERP

A

Enterprise Resource Planning

Business process management integrated into multiple
aspects of an organization, it services, and human
resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ESP

A

Encapsulated Security Payload

A header used in IPSEC to create confidentiality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

ESN

A

Electronic Serial Number

An identifying number created by the Federal
Communications Commission to uniquely identify
mobile devices and radios.