Professor Messer Practice Exams Flashcards
SPF
Sender Policy Framework: An email authentication method designed to detect forging sender addresses during the delivery of the email.
NAC
Network Access Control: A way to limit network access to only authorized users.
DMARC
Domain Message Authentication Reporting and Conformance: An email authentication protocol designed to give email domain owners the ability to protect their domain from unauthorized use, commonly known as email spoofing.
DKIM
DomainKeys Identified Mail: An email method designed to detect forged sender addresses in emails.
UTM
Unified Threat Manager: A comprehensive solution that has evolved from traditional firewall solutions into a product that can perform multiple security functions within one single system.
Federation
Allows members of one organization to authenticate using the credentials of another organization.
802.1X
A network access control using EAP over Ethernet.
EAP
Extensible Authentication Protocol: An authentication framework frequently used in wireless networks.
SSO
Single Sign-on: A property of access control of multiple related, yet independent, software systems. With this property, a user logs in with a single ID and password to gain access to any of several related systems.
MTBF
Mean Time Between Failures: The average time between system failures.
RTO
Recovery Time Objective: The time within which a business process must be restored after an incident.
MTTR
Mean Time to Repair: The average time taken to repair a failed component or system.
RPO
Recovery Point Objective: describes the minimum data or operational state required to categorize a system as recovered.
SLA
Service Level Agreement: Defines the level and quality of service expected from the vendor.
SOW
Statement of Work: Specifies the particular services a vendor will deliver in a specific instance.
MOA
Memorandum of Agreement: Documents outlining mutual understandings, goals, and responsibilities but might not be legally binding.
NDA
Non‐disclosure Agreement: Binds the vendor to confidentiality, ensuring that organizational secrets or proprietary information isn’t disclosed.
COPE
Corporate Owned, Personally Enabled: A business strategy for managing mobile devices that allows employees to use corporate‐owned IT devices for personal use.
MDM
Mobile Device Management: A type of security software used by an IT department to monitor, manage, and secure employees’ mobile devices that are deployed across multiple mobile service providers and across multiple mobile operating systems being used in the organization.
WPA3
Wi-Fi Protected Access 3: An encryption protocol for 802.11 wireless networking.
PSK
Pre-Shared Key: A wireless configuration option that allows everyone on the network to use the same access key or password when connecting to the wireless network.
MFA
Multifactor Authentication: The use of multiple types of authentication checks.
CYOD
Choose Your Own Device: Allows the user to pick the make and model of their device.
SASE
Secure Access Service Edge: A next-generation VPN technology designed to optimize the process of secure communication to cloud services.
RTOS
Real-time Operating System: An OS designed for industrial equipment, automobiles, and other time-sensitive applications.
CRL
Certificate Revocation List: Used to determine if a certificate has been administratively revoked.
AUP
Acceptable Use Policy: Defined by an employer to describe the proper use of technology and systems within an organization.
HSM
Hardware Security Module: A high-end cryptographic hardware appliance that can securely store keys and certificates for all devices.
TPM
Trusted Platform Module: Used on individual devices to provide cryptographic functions and securely store encryption keys.
SLE
Single Loss Expectancy: The financial impact of a single event.
ALE
Annual Loss Expectancy: The financial loss over an entire 12-month period.
ARO
Annualized Rate of Occurrence: The number of times an event will occur in a 12-month period.
DLP
Data Loss Prevention: Can identify and block the transmission of sensitive data across the network.
RADIUS
Remote Authentication Dial-In User Service: An authentication protocol commonly used to validate user credentials.
IPsec
Internet Protocol Security: A protocol suite for authenticating and encrypting network communication.
SDN
Software-Defined Networking: This separates the control plane of devices from the data plane. This allows for more automation and dynamic
changes to the infrastructure.
UPS
Uninterruptible Power Supply: It provides an alternative power source when the main power is no longer available.
VLAN
Virtual Local Area Network: A common method of using a switch to logically segment a network. The devices in each segmented VLAN can only communicate with other devices in the same VLAN. A router is used to connect VLANs, and this router can often be used to control traffic flows between the VLANs.
VPN
Virtual Private Network: An encryption technology used to secure network connections between sites or remote end-user communication.
RBAC
Role-Based Access Control: Describes a control mechanism for managing rights and permissions in an operating system.
SDN
Software Defined Networking: Separates the planes of operation so that infrastructure devices would have a defined control plane and data plane.
Jump Server
A highly secured device commonly used to access secure areas of another network.
HSM
Hardware Security Module: A secure method of cryptographic key backup and hardware-based cryptographic offloading.
OCSP
Online Certificate Status Protocol: An internet protocol used for obtaining the revocation status of an X.509 digital certificate.
Key Escrow
Allows a trusted third party to hold cryptographic keys, ensuring they’re available if original holders lose access or in legal scenarios.
SCAP
Security Content Automation Protocol: Used as a common protocol across multiple security tools.
RAID
Redundant Array of Independent Disks: A technology that combines multiple disk drive components into a logical unit for data redundancy and performance improvement.
NGFW
Next Generation Firewall: An application-aware security technology.
WAF
Web Application Firewall: A firewall for web applications.
HIPS
Host-based Intrusion Prevention System: Monitor and block potentially harmful activity on a host.
LDAP
Lightweight Directory Access Protocol: A common protocol used for centralized authentication.
Secure Enclave
A hardware processor designed for security. It monitors the boot process, create true random numbers, sore root cryptography keys, and more.