Glossary of Terms Page 1 Flashcards

1
Q

3DES

A

Triple DES encryption - three rounds of DES encryption used to improve security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

802.11

A

Standards for network protocols for wireless devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

802.1X

A

An IEEE standard for performing authentication over networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

AAA

A

See Authentication, authorization, and accounting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Attribute-based access control (ABAC)

A

Attribute-based access control, allows us to create very complex relationships between the applications we’re using and the data that is used by those applications. ABAC authorization may consider your IP address, the time of day, your geographical location, and many other criteria to determine exactly what type of access you have.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

acceptable use policy (AUP)

A

A policy that communicates to users what specific uses of computer resources are permitted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

access

A

A subject’s ability to perform specific operations on an objective, such as a file. Typical access levels include read, write, execute, and delete.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

access control

A

Mechanisms or methods used to determine what access permissions subjects (such as users) have for specific objects (such as files).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

access control lists (ACL)

A

A list associated with an object (such as a file) that identifies what level of access each subject (such as a user) has – what they can do to the object (such as read, write, or execute).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Wireless Access Point

A

The device that allows other devices to connect to a wireless network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Active Directory

A

The directory service portion of the Windows operations system that stores information about network-based entities (such as applications, files, printers, and people) and provides a structured, consistent way to name, describe, locate, access, and manage these resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Active X

A

A Microsoft technology that facilitates rich Internet applications, and therefore extends and enhances the functionality of Microsoft Internet Explorer. Like Java, ActiveX enables the development of interactive content. When an ActiveX-aware browser encounters a web page that includes an unsupported feature, it can automatically install the appropriate application so the feature can be used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Address Resolution Protocol (ARP)

A

A protocol in the TCP/IP suite specification used to map an IP address to a Media Access Control (MAC) address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Address Space Layout Randomization (ASLR)

A

A memory-protection process employed by operation systems where the memory space is block randomized to guard against targeted injections from buffer-overflow attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly