K Flashcards
KDC
Key Distribution Center
The key server in a Kerberos realm that has access to
the keys for all principles.
KEK
Key Encryption Key
Protects a private or secret key from unauthorized
access or disclosure.
L2 Device
Switch
Filter and forward data at the MAC layer.
L2TP
Layer 2 Tunneling Protocol
Supports VPN site to site connections but does not
encrypt.
L3 Device
Router
This is an infrastructure device that interconnects
networks and can span different technologies.
LAN
Local Area Network
A network composed of relatively short-range protocols
that facilitate swift transfer of information.
LDAP
Lightweight Directory
Access Protocol
This is a protocol designed to work with AD or NDS
information from a tree.
LEAP
Lightweight Extensible
Authentication Protocol
Commonly integrated with Cisco systems to facilitate
centralized authentication.
Logic bomb
Insider alteration
A category of malicious activity, wherein an authorized
user adds unwanted instructions.
Logic bombs do not require communication with the attacker, backdoors do • These are inserted by malicious insiders • The greatest area of threat