Professor Messer test Flashcards
MTBF
The MTBF (Mean Time Between Failures) is a prediction of how often a repairable system will fail.
MTTF
MTTF (Mean Time to Failure) is the expected lifetime of a non-repairable
product or system.
RTO
RTO (Recovery Time Objectives) define a set of objectives needed to
restore a particular service level.
Vishing
Vishing (voice phishing) attacks use the phone to obtain private information from others. In this example, the attacker was not asking for confidential information.
EAP-TTLS
EAP-TTLS (Extensible Authentication Protocol - Tunneled Transport Layer
Security) allows the use of multiple authentication protocols transported
inside of an encrypted TLS (Transport Layer Security) tunnel. This allows
the use of any authentication while maintaining confidentiality with TLS.
CASB uses
A CASB (Cloud Access Security Broker) can be used to apply security policies to cloud-based implementations. Two common functions of a CASB are visibility into application use and data security policy use. Other common CASB functions are the verification of compliance with formal standards and the monitoring and identification of threats.
False negative
A false negative is a result that fails to detect an issue when one actually exists. (think of the scenario where a patch exists but the vulnerability scanner fails to pick it up)
non persistent environment
A non-persistent environment is always in motion, and application instances can be created, changed, or removed at any time.
nbtstat
The nbtstat (NetBIOS over TCP/IP statistics) command is used in Windows to send NetBIOS queries to other Windows devices.
Virtual Mobile Infrastructure (VMI)
Virtual Mobile Infrastructure (VMI) is a mobile-centric technology that runs mobile apps on a mobile operating system (OS)/virtual machine that is located on a remote server. This essentially creates a virtual device running in the data center that can be accessed by a thin client app on mobile endpoints.
Virtual Mobile Infrastructure (VMI)
Virtual Mobile Infrastructure (VMI) is a mobile-centric technology that runs mobile apps on a mobile operating system (OS)/virtual machine that is located on a remote server. This essentially creates a virtual device running in the data center that can be accessed by a thin client app on mobile endpoints.
threshold analysis
A threshold analysis is the process of identifying business processes that
are privacy-sensitive, and it’s usually associated with privacy compliance
and not with the identification of security weaknesses.
ITIL
ITIL is a framework of best practices for delivering IT services. ITIL’s systematic approach to IT service management can help businesses manage risk, strengthen customer relations, establish cost-effective practices, and build a stable IT environment that allows for growth, scale and change.
COBIT
example, COBIT (Control Objectives for Information and Related Technologies) is a framework that many organizations use to ensure that business goals and IT security goals are linked together.
SOX
The Sarbanes-Oxley Act (SOX) was passed in 2002 to ensure that shareholders and citizens were protected from accounting errors or fraudulent practices occurring in enterprises. It also helps to ensure the accuracy of public disclosures made by these enterprises.