Day 5 Reversed Flashcards

1
Q

DSA

A

Digital Signature Algorithm

An algorithm created by the NSA to implement non-repudiation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

DSL

A

Digital Subscriber Line

High-speed Internet conductivity based upon existing infrastructure for telephones.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

EAP

A

Extensible Authentication Protocol

A derivative of PPP used by wired and wireless networks to validate connections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ECB

A

Electronic Code Book

A mode of symmetric encryption that divides the message into each block and encrypts them separately.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

ECC

A

Elliptic Curve Cryptography

An algorithm commonly used for key exchange that relies upon geometric complexities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

ECDHE

A

Elliptic Curve Diffie-Hellman Ephemeral

Used to negotiate a temporary shared secret using a public and private key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

ECDSA

A

Elliptic Curve Digital Signature Algorithm

This signing technique employs the complexities of geometry, instead of factoring prime numbers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

EDR

A

Endpoint Detection and Response

An intranet technology designed to protect access to the infrastructure, identify threats and quarantine known offenders.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

EF

A

Exposure Factor

Typically referenced as a percentage value indicating value lost from one attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

EFS

A

Encrypted File System

A cryptosystem built into Microsoft that allows selective encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

EIP

A

Extended Instruction Pointer

A programming concept that points an application to the bottom or next step in execution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

EMI

A

Electromagnetic Interference

Typically associated with accidental radiation of signals that interfere with IT systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

EMP

A

Electro Magnetic Pulse

Large and significant discharge of signals that can create a denial of service in transmission and storage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

EOL

A

End of Life

This term identifies when a product has reached the end of its useful life according to the vendor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

EOSL

A

End of Service Life

This term identifies when a product has reached the end of its useful life and is no longer patched or fixed or maintained.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

ERP

A

Enterprise Resource Planning

Business process management integrated into multiple aspects of an organization, IT Services, and Human Resources.

17
Q

ESP

A

Encapsulated Security Payload

A header used in IPSEC to create confidentiality.

18
Q

ESN

A

Electronic Serial Number

An identifying number created by the Federal Communications Commission to uniquely identify mobile devices and radios.

19
Q

FACL

A

File System Access Control List

This is creating filters or restrictions on disk storage.

20
Q

FAR

A

False Acceptance Rate

When biometrics malfunction, incorrectly granting permissions.

21
Q

FDE

A

Full Disk Encryption

Enforcing confidentiality across the entire storage device.

22
Q

FIM

A

File Integrity Monitoring

A defensive control designed to assess or validate the integrity of files, such as Tripwire.

23
Q

FPGA

A

Field Programmable Gate Array

An integrated circuit or chip that may be revised or configured after manufacture.

24
Q

FRR

A

False Rejection Rate

A biometric measurement, indicating the rate at which authorized personnel are forbidden access.

25
FTP
File Transfer Protocol A file management application designed to insecurely upload and download files.
26
FTPS
File transfer Protocol - Secure A relative of HTTPS implemented in the same way with certificates and key exchange.
27
Full BU
Full Backup It moves files to alternative media that regardless of whether the archive bit is set, and then it clears it.