2.0 Flashcards

1
Q

MFD

A

Multifunction devices
A device, such as a printer, with multiple functions, such as printing and scanning.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

SoC

A

System on a Chip
The integration of complete system functions on a single chip in order to simplify construction of devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

RTOS

A

Real-Time Operating System
Are designed for devices where the processing must occur in real time and data cannot be queued or buffered for any significant length of time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

IaaS

A

Allows an organization to outsource its equipment requirements, including the hardware and all support operations. The IaaS service provider owns the equipment, houses it in its data center, and performs all the required hardware maintenance.
Ex. Amazon Web Services (AWS), Microsoft Azure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

SaaS

A

Software as a Service
Any software or application provided to users over a network such as the Internet. Internet users access the SaaS applications with a web browser.
Ex. Gmail, Yahoo! Mail, Google Docs, One Drive etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

PaaS

A

Platform as a Service
provides customers with a preconfigured computing platform they can use as needed. It provides the customer with an easy-to-configure operating system, combined with appropriate applications and on-demand computing.
Ex. Salesforce, Github, Docker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

TOTP

A

Time-based One-Time Password
A password that is used once and is only valid during a specific time period.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

WAF

A

Web Application Firewall
A firewall that operates at the application level, specifically designed to protect web applications by examining requests at the application stack level.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Public Cloud

A

A cloud service that is rendered over a system open for public use. Services are available from third-party companies, such as Amazon, Google, Microsoft, and Apple.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Community Cloud

A

A cloud system is one where several organizations with a common interest share a cloud environment for the specific purposes of the shared endeavor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Private Cloud

A

A cloud system where it is essentially reserved resources used only by your organization if your organization is highly sensitive to sharing resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Hybrid Cloud

A

Is a combination of two or more clouds. They can be private, public, community, or a combination of these.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Federation

A

Defines policies, protocols, and practices to manage identities across systems and organizations. Federation’s ultimate goal is to allow users to seamlessly access data or systems across domains.
Ex. Provide network access to others, not just employees but partners, suppliers, customers, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

DNS sinkhole

A

Domain Name System sinkhole
This is a technique used to redirect malicious or unwanted traffic to a specific IP address. It’s often used as a security measure to block access to malicious domains or to filter out unwanted content.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Honeynet

A

A network designed to look like a corporate network but is made attractive to attackers. A honeynet is a collection of honeypots.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Honeypot

A

Is a server that is designed to act like a real server on a corporate network, but rather than having real data, the honeypot possesses fake data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Screened subnet (formerly known as DMZ)

A

Demilitarized zone
A network segment that exists in a semi-protected zone between the Internet and the inner, secure trusted network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

UPS

A

Uninterruptible power supply
Provides short-term power and can protect against power fluctuations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Blockchain

A

A distributed ledger with growing lists of records (blocks) that are securely linked together via cryptographic hashes.
Keeps track of transactions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Asymmetric encryption

A

Uses two keys (public and private) created as a matched pair.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Symmetric encryption

A

Uses the same key to encrypt and decrypt data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Faraday cage

A

Room/ cage that prevents radio frequency (RF) signals or Electromagnetic interference (EMI) from entering into or emanating beyond a room.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Obfuscation

A

Altering the format, structure, or presentation of data or code without changing its functionality, making it challenging for adversaries to interpret or exploit the information.

24
Q

Key stretching

A

Cryptographic technique used to enhance the security of passwords or cryptographic keys by increasing their complexity and resistance to brute-force attacks.

25
Q

Digital signature

A

An electronic, encrypted, stamp of authentication on digital information such as email messages, macros, or electronic documents. Used for non-repudiation and integrity.

26
Q

MSP

A

Managed Service Provider
A third party that manages aspects of a system under some form of service agreement.

MSP support
– Network connectivity management
– Backups and disaster recovery
– Growth management and planning

27
Q

Continuous monitoring

A

To describe the technologies and processes employed to enable rapid detection of compliance issues and security risks. Check for a particular event, and then react.

28
Q

Stored Procedure

A

Stored procedures are precompiled scripted methods of data access (SQL)

29
Q

Normalization

A

The process of creating the simplest form, of a string, before processing.

30
Q

Attestation

A

Attestation can be done by a service that checks the credentials supplied, and if they are correct and match the required values, the service can attest that the entry is valid or correct.

31
Q

HOTP

A

HMAC-based One-Time Password algorithm

Keyed-hash message authentication code (HMAC). The keys are based on a secret key and a counter. Use them once, and never again.

32
Q

HE

A

Homomorphic Encryption

A set of algorithms that allows operations to be conducted on encrypted data, without decrypting and reencrypting.

33
Q

ECC

A

Elliptic curve cryptography

Instead of numbers, use curves!
– Uses smaller keys than non-ECC asymmetric
encryption
– Smaller storage and transmission requirements
– Perfect for mobile devices

34
Q

Key exchange

A

A cryptographic method used to share cryptographic keys between two entities.

35
Q

Ephemeral keys

A

Cryptographic keys that are used only once after generation.

36
Q

Diffie–Hellman key exchange

A

Cryptographic protocol used to securely exchange encryption keys over an insecure medium.

37
Q

Perfect forward secrecy

A

A feature of cryptographic systems that ensures that even if a long-term secret key is compromised, past communications remain secure. Generates random public keys for each session

38
Q

Steganography

A

hides data inside other data, it hides data in plain sight. The goal is to hide the data in such a way that no one suspects there is a hidden message.

39
Q

Stream Cipher

A

Encrypts data as a stream of bits or bytes rather than dividing it into blocks. It is done one at a time

40
Q

Block

A

A block cipher encrypts plaintext one block at a time.

41
Q

IP schema

A

An IP address plan or model

42
Q

IRM

A

Information Rights Document

To control how data is used. Restrict data access to unauthorized persons.

43
Q

Fake telemetry

A

A deception technology used to make honeynets and honeypots look real and appealing to would-be attackers.

44
Q

Edge computing

A

The practice of storing and processing data close to the devices that generate and use the data. Which could be within a local area network (LAN) or on devices themselves.

45
Q

Fog Computing

A

A distributed cloud architecture placed at various points in the network, including at the edge, in local data centers, and even in cloud data centers, forming a continuum of computing resources.

46
Q

Thin Client

A

A lightweight computer, with limited resources, whose primary purpose is to communicate with another machine

47
Q

Container

A

Services or applications within isolated containers or application cells.

48
Q

Microservices

A

They are small, independent code modules that perform specific functions, receive input (value), and produce output (value) through well-defined interfaces or APIs.

49
Q

Serverless Architecture

A

A cloud computing model where developers can build and run applications without managing the underlying infrastructure.

50
Q

Transfer gateway

A

A network connection that is used to interconnect virtual private clouds (VPCs) and on-premises networks. Using transit gateways, organizations can define and control communication between resources on the cloud provider’s network and their own infrastructure.

51
Q

Resource policies

A

Assigning permissions to cloud resources

52
Q

Service Integration

A

Deploying multiple connection from multiple cloud services

53
Q

SDN

A

Software-Defined Networking
an approach to networking that separates the control plane from the data plane, allowing centralized control and programmability of network devices through software-based controllers.

54
Q

SDV

A

Software-Defined Visibility

Ensures that all traffic is viewable and can be analyzed.

55
Q

Virtual machine (VM)
sprawl avoidance

A

Refers to strategies and practices aimed at preventing the uncontrolled proliferation of virtual machines within an IT environment.

56
Q

VM escape protection

A

Refers to measures and techniques implemented to prevent unauthorized access or exploitation of vulnerabilities that could allow an attacker to escape from a virtual machine (VM) and gain access to the underlying hypervisor or host system.