Q & R Flashcards
QA
Quality Assurance
The monitoring and control function an organization
that identifies, prevents or corrects errors in processes,
procedures or products.
QoS
Quality of Service
A networking function that seeks to reserve bandwidth
in order to preserve the timing and availability of
communication, especially as it pertains to multimedia.
RA
Recovery Agent
The party in PKI who is capable of obtaining a private
key locked away in escrow.
RA
Registration Authority
This is the entry point of a subject into PKI. It is here
that a party establishes and verifies identity before
obtaining keys.
RAD
Rapid Application Development
A model of application development that very quickly
works through the development phases.
RADIUS
Remote Authentication Dial-in User Server
The most common centralized authentication service.
RAID
Redundant Array of Inexpensive Disks
A set of standards that specify varying levels of fault
tolerance, performance and system requirements for
hard drive data storage.
RAM
Random Access Memory
This is a form of storage that allows specific and
independent access to information and does not require
a sequential read or write.
RAS
Remote Access Server
A Microsoft specific term that relates to servers that
facilitate modem-based access to an intranet.
Ransomware
Cryptovirology
Requires payment for return of information.
RAT
Remote Access Trojan
Software that implements illicit remote control
software.
RBAC
Role-based Access Control
A model of access control, typically implemented in an
inverted tree, where rights float down.
RBAC
Rule-based Access Control
A model of access regulation commonly used for
firewalls and physical controls.
RC4
Rivest Cipher version 4
A now deprecated encryption algorithm used by SSL
and WEP.
RCS
Rich Communication Services
This is designed to become a successor to SMS
messaging that provides communication between
phones and carriers.
RDP
Remote Desktop Protocol
Allows access to a system for remote management and
help desk operations.
RFC
Request for Comments
Documents that are largely specifications and
definitions for entities on the Internet.
RFID
Radio Frequency Identifier
This is a common choice for tracking small devices and
objects, as well as doorway access control.
RIPEMD
RACE Integrity Primitives Evaluation Message Digest
This is a hashing algorithm.
RMF
Risk Management Framework
This risk management paradigm was promulgated by
the US government.
ROI
Return on Investment
This is the primary metric to be used when evaluating
whether something is worth the time, effort or cost.
Rootkit
Enables and hides access
Implemented by an attacker to prevent discovery or
observation of activities.
RPO
Recovery Point Objective
A metric that identifies the number of transactions or
quantity of data that can be acceptably lost.
RSA
Rivest, Shamir, & Adleman
This algorithm relies on factoring large prime numbers.
RTO
Recovery Time Objective
A metric that identifies the maximum amount of time
allowed for an outage.
RTBH
Remotely Triggered Black Hole
Cisco term that refers to a filtering technique that dumps
unwanted traffic prior to being received in the target
network.
RTOS
Real-time Operating System
These are operating systems that work in real-time, such
as manufacturing and robotics.
RTP
Real-time Transport Protocol
One of several protocols used for
telephony/audio/video.