SY0-701: Others Flashcards

1
Q

PII

A

Personally Identifiable Information (PII)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

PHI

A

Personal Health Information (PHI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

PTZ

A

Pan-tilt-zoom (PTZ)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ECC

A

Elliptic Curve Cryptography (ECC)
- heavily used in mobile devices and it’s based on the algebraic structure of elliptical curves over finite fields to define its keys
- a public key cryptography algorithm that uses elliptic curve theory to perform security functions like encryption, authentication, and digital signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

ECCHE

A

Elliptic Curve Diffie-Hellman Ephemeral (ECCHE)
- uses a different key for each portion of the key establishment process inside the Diffie-Hellman key exchange

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

ECDSA

A

Elliptic Curve Digital Signature Algorithm (ECDSA)
- used as a public key encryption algorithm by the US Government in their digital signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

IDEA

A

International Data Encryption Algorithm (IDEA)
- symmetric block cipher which uses 64-bit blocks to encrypt plaintext to ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

RIPEMD

A

RACE Integrity Primitive Evaluation Message Digest (RIPEMD)
- a group of hash function based on MD4 which in itself is a weak hash function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

HMAC

A

Hash-based Message Authentication Code (HMAC)
- used to check the integrity of a message and provides some level of assurance that its authenticity is real
- HMAC will actually be paired with other algorithms to do the work
‣ HMAC-MD5
‣ HMAC-SHA1
‣ HMAC-SHA256

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

RAID

A

Redundant Array of Inexpensive Disks (RAID)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

IMAP

A

Internet Message Access Protocol (IMAP)
- used for secure email retrieval

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

FIM

A

File Integrity Monitoring (FIM)
- used to validate the integrity of operating system and application software files using a verification method between the current file state and known good baseline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

MD5

A

Message Digest 5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly