H Flashcards

1
Q

HA

A

High Availability

Refers to the ability of an IT system, component, or application to operate at a high level, continuously, without intervention, for a given time period.

This is enabled by eliminating single points of failure, reliably failing over to a redundant node, and monitoring for failures to initiate failover when needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

HDD

A

Hard Disk Drive

A type of data storage device that uses magnetic disks to store and retrieve digital information in computers and other devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

HIDS

A

Host-based Intrusion Detection System

A cybersecurity application that monitors malicious activity on the device that it is installed on.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

HIPS

A

Host-based Intrusion Prevention System

A cybersecurity application that monitors malicious activity on the device that it is installed on, and may respond to that activity by blocking traffic or taking other action.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

HMAC

A

Hashed Message Authentication Code

A cryptographic technique that uses a symmetric key and a hash function to verify the authenticity and integrity of data. It is used to check for data integrity and authentication of the parties involved in a transaction.

HMAC is similar to digital signatures, but instead of using asymmetric keys, HMAC uses symmetric keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

HOTP

A

HMAC-based One-Time Password

A counter-based authorization system that uses HMAC to generate OTPs for each session. Each time you log in, the counter increases to verify that a password was used and to generate a new code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

HSM

A

Hardware Security Module

A physical device that protects cryptographic keys and other secrets, and performs cryptographic processing. It is a removeable unit that runs on its own. It is often used to secure a network, rather than a single device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

HTML

A

Hypertext Markup Language

A standard markup language that defines the structure and meaning of web content. It’s made up of a series of markup codes, or elements, that are inserted into a file to be displayed on the web. These elements, also known as tags, are set off from other text in a document by using angle brackets (< and >).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

HTTP

A

Hypertext Transfer Protocol

An application layer protocol designed to transfer information between networked devices and runs on top of other layers of the network protocol stack. It’s the foundation of the World Wide Web and is used to load web pages using hypertext links.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

HTTPS

A

Hypertext Transfer Protocol Secure

A secure version of HTTP, the protocol used to send data between a website and a web browser. HTTPS encrypts data using Transport Layer Security (TLS) to make it undecipherable until a site owner unlocks it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

HVAC

A

Heating, Ventilation, Air Conditioning

Systems used in residential and commercial buildings to regulate and move heated and cooled air, and to improve indoor air quality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly