more study Flashcards

1
Q

Explain BIA

A

Business Impact Analysis is a process used by organizations to assess the potential impact of disruption to critical business operations due to various events, such as disasters, cyber attacks, etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Explain PKI

A

Public Key Infrastructure is a system used to manage digital certificates and pubic private key pairs, enabling secure communications, authentication, and data encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Explain SED

A

Self Encrypting Drive is a type of hard drive or solid state drive with built in hardware encryption capabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Key management system

A

A key management system is used to manage large security key implementations from a central console. This includes creating keys, associating keys with individuals, rotating keys on regular basis and logging all jey use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is orchestration

A

Orchestration describes the process of automating and is commonly associated with large scale automation or automating processes between different system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is HA

A

High Availability means the service should always be on and available

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is WAF

A

Web Application Firewall is used to protect web based application from exploits and other attacks such as sql injections, etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is LDAP?

A

LDAP is a common standard for authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is SD WAN

A

SD WAN network allows users to communicate directly to cloud based applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a jump server?

A

A jump server is often used to allow external access to internal devices commonly for maintenance or administrative tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a policy engine (PE)?

A

PE is located in the control plane of zero trust infrastructure and evaluates each access decision based on security policy and other information resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a proxy server

A

A proxy server can be used to monitor incoming and outgoing network communication. Proxy servers can be used to identify malicious software, filter content or increase performance through file caching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly