I Flashcards

1
Q

IaaS

A

Infrastructure as a Service

Implementing cloud-based networks, servers and other
infrastructure. user manages the most.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

IAM

A

Identity and Access Management

The policies, procedures and technologies that facilitate
ensuring that only the appropriate personnel have access
to resources in an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ICMP

A

Internet Control Message Protocol

A multifunctional protocol designed to perform network
testing and report errors. (ping)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ICS

A

Industrial Control Systems

Semi-intelligent devices used to control industrial or
scientific equipment from central consoles.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

IDEA

A

International Data Encryption Algorithm

This is a symmetric cipher that is block-oriented, with
the key size of 128 bits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

IDF

A

Intermediate Distribution Frame

The wiring panels linked by risers between floors to
perform cross-connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

IdP

A

Identity Provider

A service that contain subjects and can perform
centralized authentication on behalf of service
providers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

IDS

A

Intrusion Detection System

A generic term referring to generating alerts four
malicious activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

IEEE

A

Institute of Electrical and Electronics Engineers

The mission of the IEEE is to promote and develop
technological advances for the benefit of humanity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

IKE

A

Internet Key Exchange

This is used prior to IPSEC for the negotiation,
exchange and management of symmetric key
information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

IM

A

Instant Messaging

A class of online chat that offers real-time transmission
of messages over the Internet and local area networks.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Image

A

Drive cloning

The archival of information, bit by bit, or sector by
sector to alternative media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

IMAP4

A

Internet Message Access Protocol v4

This application listens on TCP/143 and it is clear text
form.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Incremental

BU

A

Incremental backup

It moves files to alternative media that have the archive
bit set, and then it clears it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Input

validation

A

Inspection or sanitation

The verification of programmatic input to an
application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

IoC

A

Indicators of Compromise

Artifacts and other forensic data that may be used to
identify illicit activity, malware and data breaches.

17
Q

IoT

A

Internet of Things

A reference to network devices that typically have little
defensive capability.

18
Q

IP

A

Internet Protocol

A layer 3 system for addressing, fragmenting,
reassembly and delivery of datagrams.

19
Q

IPS

A

Intrusion Prevention System

A security measure designed to detect as well as prevent
threats from advancing or escalating.

20
Q

IPSec

A

Internet Protocol Security

Generally considered the most secure remote access
protocol.

21
Q

IPv6

A

Internet Protocol version 6

Greatly expands the address in space, provides for
simplified headers and has hexadecimal addressing.

22
Q

IR

A

Incident Response

A generic reference to steps to be taken after specific
adverse events occur.

23
Q

IRC

A

Internet Relay Chat

A protocol commonly implemented by helpdesks and
Bots.

24
Q

IRP

A

Incident Response Plan

Devised plans to be implemented upon the
manifestation of a specific threat.

25
Q

ISA

A

Interconnection Security Agreement

The agreed-upon measures, settings and protocols taken
by two organizations to facilitate communication.

26
Q

ISFW

A

Internal Segmentation Firewall

A network firewall placed on the intranet to separate
two different security zones.

27
Q

ISO

A

International Organization
for Standardization

An international nonprofit organization that develops
and publishes standards.

28
Q

ISP

A

Internet Service Provider

An organization that facilitates access to a worldwide
digital network.

29
Q

ISSO

A

Information Systems
Security Officer

An organizational role charged with developing,
implementing, testing and reviewing IT security.

30
Q

ITCP

A

IT Contingency Plan

Minimizing risk by identifying threats of the
vulnerabilities in the appropriate measures to limit or
prevent them.

31
Q

IV

A

Initialization Vector

This is a random number that augments a secret key to
enhance security for a session.