Day 6 Reversed Flashcards

1
Q

GCM

A

Galois Counter Mode

Useful for protecting packet data as it has little latency and minimum operation overhead.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

GDPR

A

General Data Protection Regulation

A law from the European Union that directs protection and privacy of personal information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

GPG

A

Gnu Privacy Guard

The free incarnation of a popular cryptosystem, commonly used to secure email.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

GPO

A

Group Policy Object

A feature of Windows that provides centralized management of configuration and settings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

GPS

A

Global Positioning System

A satellite-based protocol that can closely identify the location or asset.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

GPU

A

Graphic Processing Unit

These processors have an alternate use in discovering keys and cracking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

GRE

A

Generic Routing Encapsulation

An old and standard protocol that inserts one packet within another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

HA

A

High Availability

Ensuring that system uptime extends longer than what it normally would.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

HDD

A

Hard Disk Drive

A mass storage system, typically implemented with spinning platters and heads that perform reading and writing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

HIDS

A

Host-based Intrusion Detection System

A defensive application that identifies anomalous or malicious activities within a device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

HIPS

A

Host-based Intrusion Prevention System

A defensive application that prevents anomalous or malicious activities within a device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

HMAC

A

Hashed Message Authentication Code

Implementing non-repudiation via an exchanged value and hashing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Honeynet

A

Honeypot Network

A sophisticated system designed to locate, discover, distract and otherwise observe malicious behavior.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Honeypot

A

Fake Target

Used to identify and distract hackers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Host Firewall

A

Software firewall

The last line of defense for a system against a malicious intranet host.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Host File

A

Local resolver

This is a file wherein the system manager may define their own names to resolve IP addresses.

17
Q

HOTP

A

HMAC-based One-Time Password

Performs authentication by requiring a user to enter a system generated code into a hashing or calculating algorithm that produces a response.

18
Q

HSM

A

Hardware Security Module

These key management systems are ideally suited for automated private key transactions that require strong security.

19
Q

HSMaaS

A

Hardware Security Module as a Service

A cloud-based service that allows customers to create, manage and implement encryption keys.

20
Q

HTML

A

Hypertext Markup Language

The scripting used by browsers to interpret and display content.

21
Q

HTTP

A

Hypertext Transfer Protocol

The means by which HTML and images are viewed and accessed by browsers.

22
Q

HTTPS

A

Hypertext Transfer Protocol over SSL/TLS

Performing HTTP over an encrypted channel.

23
Q

HVAC

A

Heating, Ventilation and Air Conditioning

The heating, cooling and other environmental aspects of a building.

24
Q

IaaS

A

Infrastructure as a Service

Implementing cloud-based networks, servers and other infrastructure.

25
IAM
Identity and Access Management The policies, procedures and technologies that facilitate ensuring that only the appropriate personnel have access to resources in an organization.
26
ICMP
Internet Control Message Protocol A multifunctional protocol designed to perform network testing and report errors.
27
ICS
Industrial Control Systems Semi-intelligent devices used to control industrial or scientific equipment from central consoles.