SY0-701 : Objective 1.0 Flashcards

1
Q

NIPS

A

Network Intrusion Prevention Systems (NIP)
- a combination of hardware and software that protects computer networks from malicious activity and unauthorized access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

IDS

A

Intrusion Detection System (IDS)
- a cybersecurity solution designed to identify and generate alerts regarding potential intrusions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

SIEM

A

Security Information and Event Management (SIEM)
- a security management system that helps organizations identify, analyze, and respond to security threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

NAC

A

Network Access Control (NAC)
- a security solution that enforces policy on devices that access networks to increase network visibility and reduce risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

DLP

A

Data Loss Protection (DLP)
- a cybersecurity solution that helps organizations detect and prevent data breaches and leaks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

CIA

A

Confidentiality, Integrity, Availability (CIA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

AAA

A

Authentication, Authorization, and Accounting (AAA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

PKI

A

Public Key Infrastructure (PKI)
- refers to tools used to create and manage public keys for encryption, it is used to create, distribute, manage, store, and revoke digital certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

CA

A

Certificate Authority (CA)
- a trusted entity that issues Secure Sockets Layer (SSL) certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

RA

A

Registration Authority (RA)
- an authority in a network that verifies user requests for a digital certificate and tells the certificate authority (CA) to issue it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

CRL

A

Certification Revocation List (CRL)
- a list of digital certificates that have been revoked by the issuing certificate authority (CA) before their actual or assigned expiration date

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

OCSP

A

Online Certificate Status Protocol (OCSP)
- an alternative to the certificate revocation list (CRL) and is used to check whether a digital certificate is valid or if it has been revoked

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

CSR

A

Certificate Signing Request (CSR)
- a specially formatted encrypted message sent from a Secure Sockets Layer (SSL) digital certificate applicant to a certificate authority (CA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

WAF

A

Web Application Firewall (WAF)
- helps protect web applications by filtering and monitoring HTTP traffic between a web application and the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

AES

A

Advanced Encryption Standard (AES)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

RSA

A

Rivest, Shamir, & Adleman (RSA)

17
Q

DSA

A

Digital Signature Algorithm (DSA)
- a FIPS (Federal Information Processing Standard) and public-key cryptosystem that’s used for digital signatures

18
Q

PKCS

A

Public Key Cryptographic Standards (PKCS)
- a set of protocols that help ensure secure information exchange over the internet

19
Q

TLS

A

Transport Layer Security (TLS)
- a cryptographic protocol that protects data sent over the internet by encrypting the connection between a client and a server

20
Q

MAC

A

Message Authentication Code (MAC)
- a cryptographic technique used to verify the authenticity and integrity of a message

21
Q

TPM

A

Trusted Platform Module (TPM)
- a specialized chip on a laptop or desktop computer that is designed to secure hardware with integrated cryptographic keys

22
Q

HSM

A

Hardware Security Modules (HSM)
- are hardened, tamper-resistant hardware devices that secure cryptographic processes by generating, protecting, and managing keys used for encrypting and decrypting data and creating digital signatures and certificates

23
Q

SHA

A

Secure Hashing Algorithm (SHA)
- a modified version of MD5 and used for hashing data and certificates

24
Q

OID

A

Object Identifier (OID)
- a unique number that identifies a specific object or attribute in a directory

25
Q

EFS

A

Encrypted File System (EFS)
- a Windows feature that encrypts files and folders to protect them from unauthorized access

26
Q

SAN

A

Subject Alternative Name (SAN)
- a field in an X.509 certificate that allows multiple hostnames to be associated with a single public key

27
Q

CVE

A

Common Vulnerabilities and Exposures (CVE)
- a list of publicly known cybersecurity vulnerabilities that affect software, hardware, and firmware

28
Q

PEM

A

Privacy Enhanced Email (PEM)
- a set of standards that define how to secure emails and other data using encryption, digital signatures, and certificates

29
Q

SAML

A

Security Assertion Markup Language (SAML)
- open federation standard that allows an identity provider (IdP) to authenticate users and then pass an authentication token to another application known as a service provider (SP)

30
Q

RADIUS

A

Remote Authentication Dial-In User Service (RADIUS)
- client-server protocol enables remote access servers to communicate with a central server

31
Q

SSL

A

Secure Socket Layer (SSL)

32
Q

EAP

A

Extensible Authentication Protocol (EAP)
- an authentication framework that allows for the use of different authentication methods for secure network access technologies