Exam 1 Flashcards
What is a “passive foot print”
Learning as much as your can from open sources like social media, web sites, reedit,dumpster diving etc..
A third party is going to gather information about your company from open sources
Passive footprint
What is TLS
“Transport layer security”
A cryptographic protocol used to encrypt network communications
What is HTTPS
“Hypertext Transfer Protocol Secure”
It is a protocol that secures communication and data transfer between a user’s web browser and a website
What is ftps
“File transfer protocol secure” uses tls to provide secure communication also https
What is SSH and what is it used for
“Secure shell”
secure protocol user to connect to computers remotely using a secure connection
What is SRTP
“Secure real time protocol”
Adds encryption when talking over a company phone, the encryption used for this is called (aes) to encrypt voice in video
What is DNSSEC
“Domain name system security extensions” a way to validate with the information you’re getting from the DNS server is actually coming from the devil server by using a public key cryptography
What kind of actor is organize crime
Usually does things for money
What is a Hacktivist?
Focus or political agenda not commonly on financial gain
What is partition data in temporary file systems part of
The file storage subsystem
What is “MFD”
“Multifunction device”
An all in one printer that can print, scan and fax is a
What is IoT
“Internet of things”
Wearable technology and home automation devices

What is RTOS
“Real time operating systems “
Are used in manufacturing and automobiles
What is SoC
“System on a chip”
Multiple component is the one on the single chip or categorize
What is SOAR
“Security orchestration automation and response”
SOAR seeks to alleviate the strain on IT teams by incorporating automated responses to a variety of events
What is PKI
“Public key infrastructure”
PKI uses cryptographic public keys that are connected to a digital certificate, which authenticates the device or user sending the digital communication
What is IaaS
“Infrastructure as a service”
A cloud service that provides the hardware required for deploying, application, instances, and other cloud-based applications
delivers IT infrastructure like compute, storage, and network resources on a pay-as-you-go basis over the internet
Amazon, Google
What is a another word for “on path attack”
Man in the middle
Federation
Would allow one member of organization to use credentials of another organization
What is MTBF
“Mean time between failures”
Is a prediction of how often a repairable system will fail
What is RTO
“Recovery time objectives”
A set of objectives needed to restore a particular service level
What is MTTR
“Mean time to restore”
The amount of time it takes to repair a component
What is MTTF
“Mean time to failure”
The expected lifetime of a non-repairable product or system
What is EAP-TTLS
“Extensible authentication protocol tunneled transport layer security”
Allows the use of multiple authentication protocols transported inside of an encrypted TLS tunnel
What is a CASB
“Cloud, excess security broker”
Can be used to apply security policies to cloud based implementations
Common functions of CASB
visibility into application used in data security policy use, Verification of compliance with formal standards, and the monitoring, and identification of threats