Q & R Flashcards

1
Q

QA

A

Quality Assurance

The monitoring and control function an organization
that identifies, prevents or corrects errors in processes,
procedures or products.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

QoS

A

Quality of Service

A networking function that seeks to reserve bandwidth
in order to preserve the timing and availability of
communication, especially as it pertains to multimedia.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

RA

A

Recovery Agent

The party in PKI who is capable of obtaining a private
key locked away in escrow.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

RA

A

Registration Authority

This is the entry point of a subject into PKI. It is here
that a party establishes and verifies identity before
obtaining keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

RAD

A

Rapid Application Development

A model of application development that very quickly
works through the development phases.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

RADIUS

A

Remote Authentication Dial-in User Server

The most common centralized authentication service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

RAID

A

Redundant Array of Inexpensive Disks

A set of standards that specify varying levels of fault
tolerance, performance and system requirements for
hard drive data storage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

RAM

A

Random Access Memory

This is a form of storage that allows specific and
independent access to information and does not require
a sequential read or write.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

RAS

A

Remote Access Server

A Microsoft specific term that relates to servers that
facilitate modem-based access to an intranet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Ransomware

A

Cryptovirology

Requires payment for return of information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

RAT

A

Remote Access Trojan

Software that implements illicit remote control
software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

RBAC

A

Role-based Access Control

A model of access control, typically implemented in an
inverted tree, where rights float down.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

RBAC

A

Rule-based Access Control

A model of access regulation commonly used for
firewalls and physical controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

RC4

A

Rivest Cipher version 4

A now deprecated encryption algorithm used by SSL
and WEP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

RCS

A

Rich Communication Services

This is designed to become a successor to SMS
messaging that provides communication between
phones and carriers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

RDP

A

Remote Desktop Protocol

Allows access to a system for remote management and
help desk operations.

17
Q

RFC

A

Request for Comments

Documents that are largely specifications and
definitions for entities on the Internet.

18
Q

RFID

A

Radio Frequency Identifier

This is a common choice for tracking small devices and
objects, as well as doorway access control.

19
Q

RIPEMD

A

RACE Integrity Primitives Evaluation Message Digest

This is a hashing algorithm.

20
Q

RMF

A

Risk Management Framework

This risk management paradigm was promulgated by
the US government.

21
Q

ROI

A

Return on Investment

This is the primary metric to be used when evaluating
whether something is worth the time, effort or cost.

22
Q

Rootkit

A

Enables and hides access

Implemented by an attacker to prevent discovery or
observation of activities.

23
Q

RPO

A

Recovery Point Objective

A metric that identifies the number of transactions or
quantity of data that can be acceptably lost.

24
Q

RSA

A

Rivest, Shamir, & Adleman

This algorithm relies on factoring large prime numbers.

25
Q

RTO

A

Recovery Time Objective

A metric that identifies the maximum amount of time
allowed for an outage.

26
Q

RTBH

A

Remotely Triggered Black Hole

Cisco term that refers to a filtering technique that dumps
unwanted traffic prior to being received in the target
network.

27
Q

RTOS

A

Real-time Operating System

These are operating systems that work in real-time, such
as manufacturing and robotics.

28
Q

RTP

A

Real-time Transport Protocol

One of several protocols used for
telephony/audio/video.