400 Flashcards
Anything that occurs after the fact - such as an audit or review
postmortem
Controls intended to prevent attacks or intrusions
preventive controls
A state of security in which information isn’t seen by unauthorized parties without the express permission of the party involved
privacy
Screens that restrict viewing of monitors to only those sitting in front of them
privacy filters
A cloud delivery model owned and managed internally
private cloud
An asymmetric encryption technology in which both the sender and the receiver have different keys
private key
The result when a user obtains access to a resource they wouldn’t
privilege escalation
The likelihood of something occurring
probability
A mode wherein a network interface card (NIC) intercepts all traffic crossing the network wire and not just the traffic intended for it
promiscuous mode
A network in which physical network security has been substituted for encryption security
protected distribution system (PDS)
An authentication protocol that replaces LEAP and for which there is native support in Windows
Protected Extensible Authentication Protocol (PEAP)
A software and hardware troubleshooting tool that is used to decode protocol information to try to determine the source of a network problem and to establish baselines
protocol analyzer
Cards that can be read by being near a reader
proximity cards
Readers capable of working with proximity cards
proximity readers
A type of system that prevents direct communication between a client and a host by acting as an intermediarty
proxy
A proxy server that also acts as a firewall - blocking network access from external networks
proxy firewall
A type of server that makes a single Internet connection and services requests on behalf of many users
proxy server
Cameras that can pan - tilt - and zoom
PTZ
A cloud delivery model available to others
public cloud
A technology that facilitates encryption using two keys—a public key and a private key- to facilitate communication
public key
A set of voluntary standards created by RSA security and industry leaders
Public-Key Cryptography Standards (PKCS)
A two-key encryption system wherein messages are encrypted with a private key and decrypted with a public key
public-key infrastructure (PKI)
The Internet Engineering Task Force (IETF) working group developing standards and models for the Public Key Infrastructure (PKI) environment
Public-Key Infrastructure X.509 (PKIX)
A collection of technologies that provide the ability to balance network traffic and prioritize workloads
QoS (quality of service)