Day 8 Flashcards

1
Q

Protects a private or secret key from unauthorized access or disclosure.

A

KEK

Key Encryption Key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Filter and forward data at the MAC layer.

A

L2 Device

Switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Supports VPN site to site connections but does not encrypt.

A

L2TP

Layer 2 Tunneling Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

This is an infrastructure device that interconnects networks and can span different technologies.

A

L3 Device

Router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A network composed of relatively short-range protocols that facilitate swift transfer of information.

A

LAN

Local Area Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

This is a protocol designed to work with AD or NDS information from a tree.

A

LDAP

Lightweight Directory Access Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Commonly integrated with Cisco systems to facilitate centralized authentication.

A

LEAP

Lightweight Extensible Authentication Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A category of malicious activity, wherein an authorized user adds unwanted instructions.

A

Logic Bomb

Insider alteration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The staging of general purpose or security management systems on the cloud that manage local agent-based systems.

A

MaaS

Monitoring as a Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

This is typified by a network interface card, along with its unique burned in identifying number.

A

MAC

Media Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A strict form of access control that prevents subjects from accessing objects above their security level.

A

MAC

Mandatory Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A small piece of information sent along with a message that validates the sender.

A

MAC

Message Authentication Code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Management software designed to allow an enterprise to maintain control over its mobile devices, smart phones and tablets.

A

MAM

Mobile Application Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A general description of a technology that allows access across entire municipal areas.

A

MAN

Metropolitan Area Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

An access point to a physical organization designed to regulate inbound and outbound access.

A

Mantrap

Screening area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A pointer to an area on the disk where initial loading information is stored.

A

MBR

Master Boot Record

17
Q

One of the oldest hashing algorithms.

A

MD5

Message Digest 5

18
Q

This is the centralized connection point between intermediate distribution frames and the outside world.

A

MDF

Main Distribution Frame

19
Q

Software that centrally controls the security aspects and configuration of smart phones.

A

MDM

Mobile Device Management

20
Q

Requiring the use of two or more of location, something you know, have, are or do.

A

MFA

Multi-Factor Authentication

21
Q

Office equipment, typically a printer, that is able to fax, photocopy and scan documents.

A

MFD

Multifunction Device

22
Q

A printer that can fax, photocopy and scan documents.

A

MFP

Multifunction Printer

23
Q

An attacker insinuates itself between a client and a server, observing or modifying communication.

A

MITM

Man-in-the-Middle

24
Q

On-Path attack wherein a node listens to and takes over a conversation by insinuating itself in the stream of communication.

A

MITM

Man in the middle

25
A component of artificial intelligence that enables a system to learn, adapt and improve based upon inputs without having to be reprogrammed.
ML Machine Learning
26
A protocol intended to facilitate multimedia transfer over SMS.
MMS Multimedia Message Service
27
This is a document that describes the cooperative work to be taken together by two parties toward an objective.
MOA Memorandum of Agreement
28
This provides terms and details necessary for two parties to work together.
MOU Memorandum of Understanding