SY0-701 : Objective 3.0 Flashcards
RPO
Recovery Point Objective (RPO)
- represents the maximum acceptable amount of data loss measured in time
- if an organization has a RPO of 4 hours, it means the business can tolerate a data loss of up to 4 hours
RTO
Recovery Time Objective (RTO)
- represents the maximum acceptable length of time the can elapse before the lack of a business function severely impacts the organization
MTBF
Mean Time Between Failure (MTBF)
- the average time between repairable failures of a technology product
SCADA
Supervisory Control and Data Acquisition (SCADA)
- a computerized system that monitors and controls industrial processes
ICS
Industrial Control System (ICS)
- involves the strategies and practices to safeguard the critical infrastructure and operational technology (OT) systems employed in several industries, such as manufacturing, energy, and transportation
IoT
Internet of Things (IoT)
FDE
Full Disk Encryption (FDE)
SDN
Software-defined Networking (SDN)
- an architecture that abstracts different, distinguishable layers of a network to make networks agile and flexible
IaC
Infrastructure as Code (IaC)
- modern approach to IT infrastructure management that involves the automating the provisioning and management of computing resources through machine readable definition files or scripts
- process that automates the provisioning and management of cloud resources
RTOS
Real-time Operating System (RTOS)
- a software system that manages tasks in real-time systems that have strict timing constraints
PDU
Power Distribution Unit (PDU)
- device that manages the power supply for computer networks, data centers, and other industrial environments
PPTP
Point-to-Point Tunneling Protocol (PPTP)
- a network protocol that enables the secure transfer of data from a remote client to a private enterprise server by creating a virtual private network (VPN) across TCP/IP-based data networks
IPSec
Internet Protocol Security (IPSec)
- protocol suite used to secure IP communications by authenticating and encrypting each IP packet in data stream
UPS
Uninterruptable Power Supply (UPS)
EAP
Extensible Authentication Protocol (EAP)
- an authentication framework that allows for the use of different authentication methods for secure network access technologies
- provides common functions and negotiation of authentication protocols and is used in wireless networks and point-to-point connections
PEAP
Protected Extensible Authentication Protocol (PEAP)
- provides a method to transport securely authentication data, including legacy password-based protocols, via 802.11 Wi-Fi networks
EAP-TTLS
Extensible Authentication Protocol-Tunnel Transport Layer Security (EAP-TTLS)
- authentication protocol that extends TLS support across multiple platforms
LEAP
Lightweight Extensible Authentication Protocol (LEAP)
- a proprietary wireless LAN authentication method developed by Cisco Systems
PSK
Pre-shared Key (PSK)
- a string of characters used for authentication and encryption in wireless networks and Virtual Private Networks (VPNs)
IKE
Internet Key Exchange (IKE)
- a secure key management protocol that is used to set up a secure, authenticated communications channel between two devices
ICMP
Internet Control Message Protocol (ICMP)
- a protocol that devices within a network use to communicate problems with data transmission
AH
Authentication Header (AH)
- A deprecated IPsec security protocol that provides integrity protection (but not confidentiality) for packet headers and data