E Flashcards

1
Q

EAP

A

Extensible Authentication Protocol

An authentication framework that allows for the use of different authentication methods for secure network access technologies. It provides some common functions and negotiation of authentication methods.

Often used in wireless and point-to-point connections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ECB

A

Electronic Code Book

The simplest and weakest AES block cipher mode. It uses no initialization vector or chaining.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ECC

A

Elliptic Curve Cryptography

A public-key (asymmetric) encryption technique that uses elliptic curve theory to create cryptographic keys that are faster, smaller, more secure, and more efficient.

It is based on the algebraic structure of elliptic curves and uses mathematics to generate security between key pairs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ECDHE

A

Elliptic Curve Diffie-Hellman Ephemeral

A variant of the DHE key exchange that uses elliptic curve cryptography to provide stronger security with smaller key sizes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

ECDSA

A

Elliptic Curve Digital Signature Algorithm

A Digital Signature Algorithm which uses keys derived from elliptic curve cryptography (ECC). It makes more efficient keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

EDR / EDTR

A

Endpoint Detection and Response
Endpoint Detection and Threat Response

A cybersecurity technology that monitors devices (endpoints) for threats and responds to them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

EFS

A

Encrypted File System

A security feature in Microsoft Windows that encrypts files and folders to protect confidential data from attackers.

It is a user-based encryption control that uses public-key encryption to generate a certificate for each user who requests encryption. The user’s private key is stored in their profile, while the public key is stored with the encrypted files. Only the user with the private key can decrypt the file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

ERP

A

Enterprise Resource Planning

A software system that helps businesses manage and automate core processes to improve performance. It streamlines operations by integrate a company’s data into a single database, so other departments can access it.

It manages day-to-day activities like accounting, procurement, project management, supply chain operations, risk management, etc. It helps plan, budget, predict, and report on an organization’s financial results.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

ESN

A

Electronic Serial Number

A unique identification number for a wireless phone that is embedded in the phone’s microchip by the manufacturer.

When a call is made by the phone, the ESN is sent to a base station, where the wireless carrier’s mobile switching office can validate the call and prevent fraud.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

ESP

A

Encapsulated Security Payload

A protocol of IPsec that encrypts and authenticates packets using a VPN.

It provides data confidentiality, data origin authentication, data integrity checking, and replay protection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly