Glossary E-F Flashcards

1
Q

EAP (Extensible Authentication Protocol)

A

Framework for negotiating authentication methods that enables systems to use hardware-based identifiers, such as fingerprint scanners or smart card readers, for authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

EAP-FAST (EAP Flexible Authentication via Secure Tunneling)

A

An EAP method that is expected to address the shortcomings of LEAP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

EAPoL (Extensible Authentication Protocol over LAN)

A

A port-based network access control (PNAC) mechanism that allows the use of EAP authentication when a host connects to an Ethernet switch.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

EAPoL (Extensible Authentication Protocol over LAN)

A

A port-based network access control (PNAC) mechanism that allows the use of EAP authentication when a host connects to an Ethernet switch.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

EAP-TLS (EAP Transport Layer Security)

A

An EAP method that requires server-side and client-side certificates for authentication using SSL/ TLS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

EAP-TTLS (EAP Tunneled Transport Layer Security)

A

An EAP method that enables a client and server to establish a secure connection without mandating a client-side certificate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

east-west traffic

A

Design paradigm accounting for the fact that data center traffic between servers is greater than that passing in and out (north-south).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

ECC (elliptic curve cryptography)

A

An asymmetric encryption algorithm that leverages the algebraic structures of elliptic curves over finite fields to derive public/private key pairs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

edge computing

A

Provisioning processing resource close to the network edge of IoT devices to reduce latency.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

e-discovery

A

Procedures and tools to collect, preserve, and analyze digital evidence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

EDR (endpoint detection and response)

A

A software agent that collects system data and logs for analysis by a monitoring system to provide early detection of threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

EF (exposure factor)

A

In risk calculation, the percentage of an asset’s value that would be lost during a security incident or disaster scenario.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

elasticity

A

The property by which a computing environment can instantly react to both increasing and decreasing demands in workload.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

entropy

A

A measure of disorder. Cryptographic systems should exhibit high entropy to better resist brute force attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

EOL (end of life)

A

Product life cycle phase where sales are discontinued and support options reduced over time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

EOSL (end of service life)

A

Product life cycle phase where support is no longer available from the vendor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

EPP (endpoint protection platform)

A

A software agent and monitoring system that performs multiple security tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

ERM (enterprise risk management)

A

The comprehensive process of evaluating, measuring, and mitigating the many risks that pervade an organization.

19
Q

error handling

A

Coding methods to anticipate and deal with exceptions thrown during execution of a process.

20
Q

escrow

A

In key management, the storage of a backup key with a third party.

21
Q

ESP (Encapsulating Security Protocol)

A

IPSec sub-protocol that enables encryption and authentication of the header and payload of a data packet.

22
Q

evil twin

A

A wireless access point that deceives users into believing that it is a legitimate network access point.

23
Q

execution control

A

The process of determining what additional software may be installed on a client or server beyond its baseline to prevent the use of unauthorized software.

24
Q

exploitation framework

A

Suite of tools designed to automate delivery of exploits against common software and firmware vulnerabilities.

25
Q

extranet

A

A private network that provides some access to outside parties, particularly vendors, partners, and select customers.

26
Q

failover

A

A technique that ensures a redundant component, device, or application can quickly and efficiently take over the functionality of an asset that has failed.

27
Q

fake telemetry

A

Deception strategy that returns spoofed data in response to network probes.

28
Q

false negative

A

In security scanning, a case that is not reported when it should be.

29
Q

false positive

A

In security scanning, a case that is reported when it should not be.

30
Q

FAR (false acceptance rate)

A

Biometric assessment metric that measures the number of unauthorized users who are mistakenly allowed access.

31
Q

Faraday cage

A

A wire mesh container that blocks external electromagnetic fields from entering into the container.

32
Q

FC (Fibre Channel)

A

High speed network communications protocol used to implement SANs.

33
Q

FDE (full disk encryption)

A

Encryption of all data on a disk (including system files, temporary files, and the pagefile) can be accomplished via a supported OS, third-party software, or at the controller level by the disk device itself.

34
Q

federation

A

A process that provides a shared login capability across multiple systems and enterprises. It essentially connects the identity management services of multiple systems.

35
Q

FIM (file integrity monitoring)

A

A type of software that reviews system files to ensure that they have not been tampered with.

36
Q

fingerprint scanner

A

Biometric authentication device that can produce a template signature of a user’s fingerprint then subsequently compare the template to the digit submitted for authentication.

37
Q

first responder

A

The first experienced person or team to arrive at the scene of an incident.

38
Q

fog computing

A

Provisioning processing resource between the network edge of IoT devices and the data center to reduce latency.

39
Q

FPGA (field programmable gate array)

A

A processor that can be programmed to perform a specific function by a customer rather than at the time of manufacture.

40
Q

FRR (false rejection rate)

A

Biometric assessment metric that measures the number of valid subjects who are denied access.

41
Q

FTK (Forensic Toolkit)

A

A commercial digital forensics investigation management and utilities suite, published by AccessData.

42
Q

FTPS

A

A type of FTP using TLS for confidentiality.

43
Q

full backup

A

A backup type in which all selected files, regardless of prior state, are backed up. full tunnel VPN configuration where all traffic is routed via the VPN gateway.