Acronyms "D, E, F" Flashcards

(39 cards)

1
Q
  • DAC (Discretionary Access Control)
A
  • Restrict access based on the identity of subjects and/or groups that they belong to
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  • DBA (Database Administrator)
A
  • DBA (Database Administrator)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  • DDoS (Distributed Denial of Service)
A
  • DDoS (Distributed Denial of Service)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  • DEP (Data Execution Prevention)
A
  • Microsoft security feature
    • Monitor and protects pages or regions of memory
    • Prevents data regions from executing (potentially malicious) code
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  • DER (Distinguished Encoding Rules)
A

variant of BER for digital certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  • DES (Data Encryption Standard)
A
  • Weak encryption algorithm
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  • DHCP (Dynamic Host Configuration Protocol)
A
  • automatically assigns an IP for a newly connected computer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  • DHE (Diffie-Hellman Ephemeral)
A
  • Way of securely exchanging cryptographic keys over public channels
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  • DKIM (Domain Keys Identified Mail)
A
  • Email authentication technique

- Allows the receiver to make sure that an email was sent by the authorized owner of that domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  • DLL (Dynamic Link Library)
A
  • a library that contains code and data that can be used by more than one program at the same time
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  • DLP (Data Loss Prevention)
A
  • detecting and preventing data breaches, exfiltration, or unwanted destruction of sensitive data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  • DMARC (Domain Message Authentication Reporting and Conformance)
A
  • Authenticates emails with SPF and DKIM

- Used to prevent phishing and spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  • DMZ (Demilitarized Zone)
A
  • a physical or logical subnet that separates a local area network (LAN) from other untrusted networks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  • DNAT (Destination Network Address Translation)
A
  • used when we need to redirect incoming packets with a destination of a public address/port to a private IP address/port inside your network.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  • DNS (Domain Name System)
A
  • converts domain names into ip addresses
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  • DNSSEC (Domain Name System Security Extensions)
A
  • Security features for DNS.

- Provides cryptographic authentication of data, authenticated denial of existence, and data integrity

17
Q
  • DoS (Denial of Service)
A
  • DoS (Denial of Service)
18
Q
  • DPO (Data Privacy Officer)
A
  • DPO (Data Privacy Officer)
19
Q
  • DRP (Disaster Recovery Plan)
A
  • DRP (Disaster Recovery Plan)
20
Q
  • DSA (Digital Signature Algorithm)
A
  • Federal Information Processing Standard for digital signatures
21
Q
  • DSL (Digital Subscriber Line)
A
  • a family of technologies that are used to transmit digital data over telephone lines.
22
Q
  • EAP (Extensible Authentication Protocol)
A
  • Authentication framework used in LANs

- Widely used

23
Q
  • ECB (Electronic Code Book)
A
  • Doesn’t hide data patterns well, so it wouldn’t work to encrypt images for example
24
Q
  • ECC (Elliptic Curve Cryptography)
A
  • Good for mobile devices because it can use smaller keys, lower processing power
25
- ECDHE (Elliptic Curve Diffie-Hellman Ephemeral)
- Key exchange mechanism based on elliptic curves
26
- ECDSA (Elliptic Curve Digital Signature Algorithm)
- Digital signature algorithm based on elliptic curve cryptography (ECC)
27
- EDR (Endpoint Detection and Response)
- endpoint security solution that continuously monitors end-user devices to detect and respond to cyber threats like ransomware and malware.
28
- EFS (Encrypted File System)
- encryption system built into Windows since Windows 2000. Cousin of BitLocker, still exists in Win 10. - EFS can do files, BitLocker can only do entire drives
29
- EOL (End of Life)
- Date set where manufacturer will no longer create the product
30
- EOS (End of Service)
- Original manufacturer no longer offers updates, support, or service
31
- ERP (Enterprise Resource Planning)
- Software used by orgs to manage day-to-day business activities
32
- ESN (Electronic Serial Number)
- ESN (Electronic Serial Number)
33
- ESP (Encapsulated Security Payload)
- Member of IPsec set of protocols | - Encrypts and authenticates packets of data between computers using VPNs
34
- FACL (File System Access Control List)
- File System Access Control List
35
- FDE (Full Disk Encryption)
- FDE (Full Disk Encryption)
36
- FPGA (Field Programmable Gate Array)
- Integrated circuit designed to be configured by a customer or designer after manufacturing. - primarily used in telecommunications and networking. - now also in consumer, automotive, and industrial applications
37
- FRR (False Rejection Rate)
- Likelihood that a biometric security system will incorrectly reject an access attempt by an authorized user
38
- FTP (File Transfer Protocol)
- FTP (File Transfer Protocol)
39
- FTPS (Secured File Transfer Protocol)
- FTPS (Secured File Transfer Protocol) | - Port: 989, 990 TCP/UDP