Day 7 Reversed Flashcards

1
Q

IDEA

A

International Data Encryption Algorithm

This is a symmetric cipher that is block-oriented, with the key size of 128 bits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

IDF

A

Intermediate Distribution Frame

The wiring panels linked by risers between floors to perform cross-connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

IdP

A

Identity Provider

A service that contain subjects and can perform centralized authentication on behalf of service providers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

IDS

A

Intrusion Detection System

A generic term referring to generating alerts four malicious activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

IEEE

A

Institute of Electrical and Electronics Engineers

The mission of the IEEE is to promote and develop technological advances for the benefit of humanity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

IKE

A

Internet Key Exchange

This is used prior to IPSEC for the negotiation, exchange and management of symmetric key information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

IM

A

Instant Messaging

A class of online chat that offers real-time transmission of messages over the Internet and local area networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Image

A

Drive Cloning

The archival of information, bit by bit, or sector by sector to alternative media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

IMAP4

A

Internet Message Access Protocol v4

This application listens on TCP/143 and it is clear text form.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Incremental BU

A

Incremental Backup

It moves files to alternative media that have the archive bit set, and then it clears it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Input Validation

A

Inspection or Sanitation

The verification of programmatic input to an application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

IoC

A

Indicators of Compromise

Artifacts and other forensic data that may be used to identify illicit activity, malware and data breaches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

IoT

A

Internet of Things

A reference to network devices that typically have little defensive capability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

IP

A

Internet Protocol

A layer 3 system for addressing, fragmenting, reassembly and delivery of datagrams.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

IPS

A

Intrusion Prevention System

A security measure designed to detect as well as prevent threats from advancing or escalating.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

IPSec

A

Internet Protocol Security

Generally considered the most secure remote access protocol.

17
Q

IPv6

A

Internet Protocol version 6

Greatly expands the address in space, provides for simplified headers and has hexadecimal addressing.

18
Q

IR

A

Incident Response

A generic reference to steps to be taken after specific adverse events occur.

19
Q

IRC

A

Internet Relay Chat

A protocol commonly implemented by helpdesks and Bots.

20
Q

IRP

A

Incident Response Plan

Devised plans to be implemented upon the manifestation of a specific threat.

21
Q

ISA

A

Interconnection Security Agreement

The agreed-upon measures, settings and protocols taken by two organizations to facilitate communication.

22
Q

ISFW

A

Internal Segmentation Firewall

A network firewall placed on the intranet to separate two different security zones.

23
Q

ISO

A

International Organization for Standardization

An international nonprofit organization that develops and publishes standards.

24
Q

ISP

A

Internet Service Provider

An organization that facilitates access to a worldwide digital network.

25
ISSO
Information Systems Security Officer An organizational role charged with developing, implementing, testing and reviewing IT security.
26
ITCP
IT Contingency Plan Minimizing risk by identifying threats of the vulnerabilities in the appropriate measures to limit or prevent them.
27
IV
Initialization Vector This is a random number that augments a secret key to enhance security for a session.
28
KDC
Key Distribution Center The key server in a Kerberos realm that has access to the keys for all principles.