Professor Messer Practice Exams Flashcards

1
Q

SPF

A

Sender Policy Framework: An email authentication method designed to detect forging sender addresses during the delivery of the email.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

NAC

A

Network Access Control: A way to limit network access to only authorized users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

DMARC

A

Domain Message Authentication Reporting and Conformance: An email authentication protocol designed to give email domain owners the ability to protect their domain from unauthorized use, commonly known as email spoofing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

DKIM

A

DomainKeys Identified Mail: An email method designed to detect forged sender addresses in emails.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

UTM

A

Unified Threat Manager: A comprehensive solution that has evolved from traditional firewall solutions into a product that can perform multiple security functions within one single system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Federation

A

Allows members of one organization to authenticate using the credentials of another organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

802.1X

A

A network access control using EAP over Ethernet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

EAP

A

Extensible Authentication Protocol: An authentication framework frequently used in wireless networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SSO

A

Single Sign-on: A property of access control of multiple related, yet independent, software systems. With this property, a user logs in with a single ID and password to gain access to any of several related systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

MTBF

A

Mean Time Between Failures: The average time between system
failures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

RTO

A

Recovery Time Objective: The time within which a business process must be restored after an incident.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

MTTR

A

Mean Time to Repair: The average time taken to repair a failed component or system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

RPO

A

Recovery Point Objective: describes the minimum data or
operational state required to categorize a system as recovered.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

SLA

A

Service Level Agreement: Defines the level and quality of service expected from the vendor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

SOW

A

Statement of Work: Specifies the particular services a vendor
will deliver in a specific instance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

MOA

A

Memorandum of Agreement: Documents outlining mutual understandings, goals, and responsibilities but might not be
legally binding.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

NDA

A

Non‐disclosure Agreement: Binds the vendor to confidentiality, ensuring that organizational secrets or proprietary information isn’t disclosed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

COPE

A

Corporate Owned, Personally Enabled: A business strategy for managing mobile devices that allows employees to use corporate‐owned IT devices for personal use.

19
Q

MDM

A

Mobile Device Management: A type of security software used by an IT department to monitor, manage, and secure employees’ mobile devices that are deployed across multiple mobile service
providers and across multiple mobile operating systems being used in the organization.

20
Q

WPA3

A

Wi-Fi Protected Access 3: An encryption protocol for 802.11
wireless networking.

21
Q

PSK

A

Pre-Shared Key: A wireless configuration option that allows
everyone on the network to use the same access key or password when connecting to the wireless network.

22
Q

MFA

A

Multifactor Authentication: The use of multiple types
of authentication checks.

23
Q

CYOD

A

Choose Your Own Device: Allows the user to pick the make and
model of their device.

24
Q

SASE

A

Secure Access Service Edge: A next-generation VPN
technology designed to optimize the process of secure communication to cloud services.

25
Q

RTOS

A

Real-time Operating System: An OS designed for industrial
equipment, automobiles, and other time-sensitive applications.

26
Q

CRL

A

Certificate Revocation List: Used to determine if a certificate
has been administratively revoked.

27
Q

AUP

A

Acceptable Use Policy: Defined by an employer to describe the
proper use of technology and systems within an organization.

28
Q

HSM

A

Hardware Security Module: A high-end cryptographic hardware appliance that can securely store keys and certificates for all devices.

29
Q

TPM

A

Trusted Platform Module: Used on individual devices to provide cryptographic functions and securely store encryption keys.

30
Q

SLE

A

Single Loss Expectancy: The financial impact of a single event.

31
Q

ALE

A

Annual Loss Expectancy: The financial loss over an entire 12-month period.

32
Q

ARO

A

Annualized Rate of Occurrence: The number of times an event will occur in a 12-month period.

33
Q

DLP

A

Data Loss Prevention: Can identify and block the transmission of sensitive data across the network.

34
Q

RADIUS

A

Remote Authentication Dial-In User Service: An authentication protocol commonly used to validate user credentials.

35
Q

IPsec

A

Internet Protocol Security: A protocol suite for authenticating
and encrypting network communication.

36
Q

SDN

A

Software-Defined Networking: This separates the control plane of
devices from the data plane. This allows for more automation and dynamic
changes to the infrastructure.

37
Q

UPS

A

Uninterruptible Power Supply: It `provides an alternative power
source when the main power is no longer available.

38
Q

VLAN

A

Virtual Local Area Network: A common method of using
a switch to logically segment a network. The devices in each segmented
VLAN can only communicate with other devices in the same VLAN. A
router is used to connect VLANs, and this router can often be used to
control traffic flows between the VLANs.

39
Q

VPN

A

Virtual Private Network: An encryption technology used
to secure network connections between sites or remote end-user
communication.

40
Q

RBAC

A

Role-Based Access Control: Describes a control mechanism for
managing rights and permissions in an operating system.

41
Q

SDN

A

Software Defined Networking: Separates the planes of operation
so that infrastructure devices would have a defined control plane and data
plane.

42
Q

Jump Server

A

A highly secured device commonly used to access secure
areas of another network.

43
Q

HSM

A

Hardware Security Module: A secure method of
cryptographic key backup and hardware-based cryptographic offloading.

44
Q
A