Glossary- K Flashcards

1
Q

key

A

See encryption key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

keycard system

A

A physical access control system where personnel are able to enter a workspace by waving a keycard near a reader or inserting it into a reader, activating a door lock to briefly unlock the door.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

key compromise

A

Any unauthorized disclosure or damage to an encryption key. See also key management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

key custody

A

The policies, processes, and procedures regarding the management of keys. See also key management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

key disposal

A

The process of decommissioning encryption keys. See also key management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

key exchange

A

A technique that is used by two parties to establish a symmetric encryp-
tion key when no secure channel is available.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

key fingerprint

A

A short sequence of characters that is used to authenticate a public key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

key generation

A

The initial generation of an encryption key. See also key management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

key length

A

This refers to the size (measured in bits) of an encryption key. Longer en- cryption keys mean that it takes greater effort to successfully attack a cryptosystem.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

key logger

A

A hardware device or a type of malware where a user’s keystrokes and, op- tionally, mouse movements and clicks are recorded and sent to the key logger’s owner.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

key management

A

The various processes and procedures used by an organization to generate, protect, use, and dispose of encryption keys over their lifetime.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

key protection

A

All means used to protect encryption keys from unauthorized disclo- sure and harm. See also key management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

key rotation

A

The process of issuing a new encryption key and re-encrypting data pro- tected with the new key. See also key management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

known error

A

An incident that has been seen before and its root cause is known.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

laptop computer

A

A portable computer used by an individual user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Layer 2 Tunneling Protocol (L2TP)

A

A TCP/IP tunneling protocol.

17
Q

layer 3 switch

A

A device that routes packets between different TCP/IP networks.

18
Q

layer 4 switch

A

A device used to route packets to destinations based on TCP and UDP port numbers.

19
Q

layer 4-7 switch

A

A device that routes packets to destinations based on their internal content.

20
Q

least privilege

A

The concept where an individual user should have the lowest privilege possible that will still enable them to perform their tasks.

21
Q

Lightweight Directory Access Protocol (LDAP)

A

A TCP/IP application layer protocol used as a directory service for people and computing resources.

22
Q

link

A

Layer 1 of the TCP/IP network model. The purpose of the link layer is the delivery of messages (usually called frames) from one station to another on a local network. See also TCP/IP network model.

23
Q

local area network (LAN)

A

A network that connects computers and devices together in a small building or a residence.

24
Q

logic bomb

A

A set of instructions that is designed to perform some damaging action when a specific event occurs; a popular example is a time bomb that alters or destroys data on a specified date in the future.

25
Q

logical network architecture

A

The part of network architecture concerned with the depiction of network communications at a local, campus, regional, and global level.

26
Q

loopback address

A

The IP address 127.0.0.1 (or any other address in the entire 127 ad- dress block). A packet sent to a loopback address is sent to the station that originated it.