P Flashcards

1
Q

P12

A

PKCS #12

This format allows for the storage of both public and
private keys in open or encrypted form.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

P2P

A

Peer to Peer

A headless file sharing system that has no centralized
point of control and facilitates wide-open file sharing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

PaaS

A

Platform as a Service

A form of access that allows an organization to create
and run its own applications on the cloud.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

PAC

A

Proxy Auto Configuration

A JavaScript based technology that regulates the
configuration of browsers and their use of web proxies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

PAM

A

Pluggable Authentication Modules

Dynamically, loadable authentication libraries used on
Linux.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

PAP

A

Password Authentication Protocol

This is an insecure authentication protocol, sometimes
used between routers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

PAT

A

Port Address Translation

Address translation that multiplexes many internal
addresses through one or a few external address, linking
connections based upon the source port.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Patch

management

A

Configuration and baseline maintenance

An application designed to identify compliance
deviations and variance from a baseline, and then rectify
it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

PBKDF2

A

Password-based Key Derivation Function 2

This cryptographic function, processes, and otherwise
insecure secret through repeated rounds of hashing to
create a longer key value.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

PBX

A

Private Branch Exchange

The point of interface between the public switched
telephone network and an organization’s internal
telephony.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

PCAP

A

Packet Capture

Sniffing and recording network data into a file for later
analysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

PCI DSS

A

Payment Card Industry Data Security Standard

A nongovernmental security standard that regulates the
implementation and security of web payment gateways.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

PDU

A

Power Distribution Unit

This is a multiple output device that regulates the power
supply and its quality to multiple devices within a rack
of devices in a data center.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

PE

A

Portable Executable

This is a format for code run by Windows systems and
32 or 64 bit mode.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

PEAP

A

Protected Extensible Authentication Protocol

An EAP form that sends MSCHAP credentials secured
within a TLS envelope.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

PED

A

Portable Electronic Device

Small electronics, such as beepers, calendars and note
applications used prior to smartphones.

17
Q

PEM

A

Privacy-enhanced Electronic Mail

This is one of the oldest formats of certificates and uses
Base64.

18
Q

PFS

A

Perfect Forward Secrecy

This is the property of Key management where in the
loss of one key is not in danger data encrypted with
earlier session keys.

19
Q

PFX

A

Personal Exchange Format

A binary format for storing or sending server certificates
and private keys.

20
Q

PGP

A

Pretty Good Privacy

A widely used cryptosystem initially used for securing
email by encryption and digital signatures.

21
Q

PHI

A

Personal Health Information

Typically sensitive information regarding the health of
an individual.

22
Q

Phishing

A

Malicious spam

Bogus messaging sent to a wide array of potential
targets.

23
Q

PII

A

Personally Identifiable Information

This is data or pieces of data that uniquely correspond to
or identify one individual and requires special handling.

24
Q

PIN

A

Personal Identification Number

Knowledge-based authentication using a single value or
number.

25
Q

PIV

A

Personal Identity Verification

An identification card that contains a photograph, RFID,
barcode, and cryptographically stored PKI information.

26
Q

Pivot

A

Staging new attack

Gaining control of one application or host in order to
manipulate a secondary target.

27
Q

PKCS

A

Public Key Cryptography Standards

Public-key encryption standards developed by RSA
Security.

28
Q

PKI

A

Public Key Infrastructure

The processes and management associated with the
identification and validation of certificates and public
keys.

29
Q

PoC

A

Proof of Concept

An implementation of an idea or theory that establishes
its validity commonly associated with vulnerabilities
and exploits.

30
Q

POODLE

A

Padding Oracle on Downgrade Legacy Encryption

An attack technique that could subvert confidentiality in
an SSL connection.

31
Q

POP

A

Post Office Protocol

This protocol listens on TCP/110 and downloads
messages from the server.

32
Q

Port scan

A

Network mapping and service enumeration

Performing address and host discovery, along with
identifying listening applications.

33
Q

POTS

A

Plain Old Telephone Service

The old form of telephony that implemented dedicated
copper connections vs. packet advised voice
transmission.

34
Q

PPP

A

Point-to-Point Protocol

This is a layer 2 technology implemented to facilitate
communication between endpoints or routers.

35
Q

PPTP

A

Point-to-Point Tunneling Protocol

A largely deprecated protocol used for establishing
tunnels and securing packet ice communication.

36
Q

PSK

A

Pre-shared Key

Managing key establishment and management by using
pre-established relationships and non-automatic
exchange methods.

37
Q

PUP

A

Potentially Unwanted Program

Defined by policy, this is software that provides
functionality in violation of authorized use.