Day 7 Flashcards

1
Q

This is a symmetric cipher that is block-oriented, with the key size of 128 bits.

A

IDEA

International Data Encryption Algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The wiring panels linked by risers between floors to perform cross-connection.

A

IDF

Intermediate Distribution Frame

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A service that contain subjects and can perform centralized authentication on behalf of service providers.

A

IdP

Identity Provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A generic term referring to generating alerts four malicious activity.

A

IDS

Intrusion Detection System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The mission of the IEEE is to promote and develop technological advances for the benefit of humanity.

A

IEEE

Institute of Electrical and Electronics Engineers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

This is used prior to IPSEC for the negotiation, exchange and management of symmetric key information.

A

IKE

Internet Key Exchange

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A class of online chat that offers real-time transmission of messages over the Internet and local area networks.

A

IM

Instant Messaging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The archival of information, bit by bit, or sector by sector to alternative media.

A

Image

Drive cloning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

This application listens on TCP/143 and it is clear text form.

A

IMAP4

Internet Message Access Protocol v4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

It moves files to alternative media that have the archive bit set, and then it clears it.

A

Incremental BU

Incremental backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The verification of programmatic input to an application.

A

Input validation

Inspection or sanitation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Artifacts and other forensic data that may be used to identify illicit activity, malware and data breaches.

A

IoC

Indicators of Compromise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A reference to network devices that typically have little defensive capability.

A

IoT

Internet of Things

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A layer 3 system for addressing, fragmenting, reassembly and delivery of datagrams.

A

IP

Internet Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A security measure designed to detect as well as prevent threats from advancing or escalating.

A

IPS

Intrusion Prevention System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Generally considered the most secure remote access protocol.

A

IPSec

Internet Protocol Security

17
Q

Greatly expands the address in space, provides for simplified headers and has hexadecimal addressing.

A

IPv6

Internet Protocol version 6

18
Q

A generic reference to steps to be taken after specific adverse events occur.

A

IR

Incident Response

19
Q

A protocol commonly implemented by helpdesks and Bots.

A

IRC

Internet Relay Chat

20
Q

Devised plans to be implemented upon the manifestation of a specific threat.

A

IRP

Incident Response Plan

21
Q

The agreed-upon measures, settings and protocols taken by two organizations to facilitate communication.

A

ISA

Interconnection Security Agreement

22
Q

A network firewall placed on the intranet to separate two different security zones.

A

ISFW

Internal Segmentation Firewall

23
Q

An international nonprofit organization that develops and publishes standards.

A

ISO

International Organization for Standardization

24
Q

An organization that facilitates access to a worldwide digital network.

A

ISP

Internet Service Provider

25
An organizational role charged with developing, implementing, testing and reviewing IT security.
ISSO Information Systems Security Officer
26
Minimizing risk by identifying threats of the vulnerabilities in the appropriate measures to limit or prevent them.
ITCP IT Contingency Plan
27
This is a random number that augments a secret key to enhance security for a session.
IV Initialization Vector
28
The key server in a Kerberos realm that has access to the keys for all principles.
KDC Key Distribution Center