SY0-701 : Objective 3.0 Flashcards

1
Q

RPO

A

Recovery Point Objective (RPO)
- represents the maximum acceptable amount of data loss measured in time
- if an organization has a RPO of 4 hours, it means the business can tolerate a data loss of up to 4 hours

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

RTO

A

Recovery Time Objective (RTO)
- represents the maximum acceptable length of time the can elapse before the lack of a business function severely impacts the organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

MTBF

A

Mean Time Between Failure (MTBF)
- the average time between repairable failures of a technology product

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

SCADA

A

Supervisory Control and Data Acquisition (SCADA)
- a computerized system that monitors and controls industrial processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

ICS

A

Industrial Control System (ICS)
- involves the strategies and practices to safeguard the critical infrastructure and operational technology (OT) systems employed in several industries, such as manufacturing, energy, and transportation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

IoT

A

Internet of Things (IoT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

FDE

A

Full Disk Encryption (FDE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

SDN

A

Software-defined Networking (SDN)
- an architecture that abstracts different, distinguishable layers of a network to make networks agile and flexible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

IaC

A

Infrastructure as Code (IaC)
- modern approach to IT infrastructure management that involves the automating the provisioning and management of computing resources through machine readable definition files or scripts
- process that automates the provisioning and management of cloud resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

RTOS

A

Real-time Operating System (RTOS)
- a software system that manages tasks in real-time systems that have strict timing constraints

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

PDU

A

Power Distribution Unit (PDU)
- device that manages the power supply for computer networks, data centers, and other industrial environments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

PPTP

A

Point-to-Point Tunneling Protocol (PPTP)
- a network protocol that enables the secure transfer of data from a remote client to a private enterprise server by creating a virtual private network (VPN) across TCP/IP-based data networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

IPSec

A

Internet Protocol Security (IPSec)
- protocol suite used to secure IP communications by authenticating and encrypting each IP packet in data stream

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

UPS

A

Uninterruptable Power Supply (UPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

EAP

A

Extensible Authentication Protocol (EAP)
- an authentication framework that allows for the use of different authentication methods for secure network access technologies
- provides common functions and negotiation of authentication protocols and is used in wireless networks and point-to-point connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

PEAP

A

Protected Extensible Authentication Protocol (PEAP)
- provides a method to transport securely authentication data, including legacy password-based protocols, via 802.11 Wi-Fi networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

EAP-TTLS

A

Extensible Authentication Protocol-Tunnel Transport Layer Security (EAP-TTLS)
- authentication protocol that extends TLS support across multiple platforms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

LEAP

A

Lightweight Extensible Authentication Protocol (LEAP)
- a proprietary wireless LAN authentication method developed by Cisco Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

PSK

A

Pre-shared Key (PSK)
- a string of characters used for authentication and encryption in wireless networks and Virtual Private Networks (VPNs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

IKE

A

Internet Key Exchange (IKE)
- a secure key management protocol that is used to set up a secure, authenticated communications channel between two devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

ICMP

A

Internet Control Message Protocol (ICMP)
- a protocol that devices within a network use to communicate problems with data transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

AH

A

Authentication Header (AH)
- A deprecated IPsec security protocol that provides integrity protection (but not confidentiality) for packet headers and data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

UTM

A

Unified Threat Management (UTM)
- an information security term that refers to a single security solution, and usually a single security appliance, that provides multiple security functions at a single point on the network

24
Q

CHAP

A

Challenge Handshake Authentication Protocol (CHAP)
- a challenge and response authentication method that Point-to-Point Protocol (PPP) servers use to verify the identity of a remote user

25
Q

PPP

A

Point-to-Point Protocol (PPP)
- a data link layer (layer 2) communication protocol between two routers directly without any host or any other networking in between

26
Q

SPF

A

Sender Policy Framework (SPF)
- email authentication method designed to prevent forging sender addresses during email delivery

27
Q

DKIM

A

Domain Key Identified Mail (DKIM)
- allows the receiver to check if the email was actually sent by the domain it claims to be sent from and if the content was tampered with during transit

28
Q

DMARC

A

Domain-based Message Authentication Reporting & Conformance (DMARC)
- an email authentication, policy, and reporting protocol, helps to prevent email spoofing and phishing

29
Q

S/MIME

A

Secure/Multipurpose Internet Mail Extensions (S/MIME)
- an email encryption and signing industry standard widely used by corporations to enhance email security

30
Q

NGFW

A

Next-generation Firewall (NGFW)
- are deep-packet inspection firewalls that move beyond port/protocol inspection and blocking to add application-level inspection, intrusion prevention, and bringing intelligence from outside the firewall

31
Q

SASE

A

Secure Access Service Edge (SASE)
- an architecture that delivers converged network and security as a service capabilities including SD-WAN and cloud native security functions such as secure web gateways, cloud access security brokers, firewall as-a-service, and zero-trust network access

32
Q

SD-WAN

A

Software-defined Wide Area Network (SD-WAN)
- virtual WAN architecture that allows enterprises to leverage any combination of transport services — including MPLS, LTE and broadband internet services — to securely connect users to applications

33
Q

COOP

A

Continuity of Operation Planning (COOP)
- A predetermined set of instructions or procedures that describe how an organization’s mission essential functions will be sustained within 12 hours and for up to 30 days as a result of a disaster event before returning to normal operations

34
Q

PCI DSS

A

Payment Card Industry Data Security Standard (PCI DSS)

35
Q

GDPR

A

General Data Protection Regulation (GDPR)

36
Q

ESP

A

Encapsulated Security Payload (ESP)
- which is a protocol that encrypts and authenticates data packets between devices, part of the IPSec suite of protocols

37
Q

HVAC

A

Heating, Ventilation Air Conditioning (HVAC)

38
Q

MPLS

A

Multi-protocol Label Switching (MPLS)
- a networking technology that routes traffic using the shortest path based on “labels,” rather than network addresses, to handle forwarding over private wide area networks, but it doesn’t have encryption by default

39
Q

HA

A

High Availability (HA)

40
Q

Role BAC

A

Role-based Access Control (Role BAC)
- a cybersecurity method that limits access to systems and networks based on a user’s role within an organization

41
Q

DAC

A

Discretionary Access Control (DAC)
- a cybersecurity model that gives the owner of a resource control over who can access it

42
Q

MAC

A

Mandatory Access Control (MAC)
- a cybersecurity model that restricts access to system resources based on a user’s authorization level and the sensitivity of the information

43
Q

Rule BAC

A

Rule-based Access Control (Rule BAC)
- a system that uses pre-defined rules to determine if a user has access to network resources.

44
Q

NAT

A

Network Address Translation (NAT)
- a routing technique that allows private IP networks to connect to the internet by translating private IP addresses to public IP addresses

45
Q

L2TP

A

Layer 2 Tunneling Protocol (L2TP)
- an extension of the Point-to-Point Tunneling Protocol (PPTP) used by internet service providers (ISPs) to enable virtual private networks (VPNs)

46
Q

RAS

A

Remote Access Server (RAS)
- a system that allows users to connect to a network remotely, as if they were physically present

47
Q

TACACS+

A

Terminal Access Controller Access Control System (TACACS+)
- a network security protocol designed to offer centralized authentication, authorization, and accounting services for remote access servers

48
Q

PAP

A

Password Authentication Protocol (PAP)
- a point-to-point protocol (PPP) authentication method that uses passwords to validate users

49
Q

PFS

A

Perfect Forward Security (PFS)
- also called forward secrecy (FS), refers to an encryption system that changes the keys used to encrypt and decrypt information frequently and automatically

50
Q

IRP

A

Incident Response Plan (IRP)
- a written document, formally approved by the senior leadership team, that helps your organization before, during, and after a confirmed or suspected security incident.

51
Q

NTP

A

Network Time Protocol (NTP)
- an internet protocol used to synchronize with computer clock time sources in a network

52
Q

MTTF

A

Mean Time to Failure (MTTF)

53
Q

MTTR

A

Mean Time To Repair (MTTR)
- represents the average time required to repair a failed component or system

54
Q

SMTP

A

Simple Mail Transfer Protocol (SMTP)

55
Q

SMTPS

A

Simple Mail Transfer Protocol Secure (SMTPS)

56
Q

IaaS

A

Infrastructure as a Service (IaaS)