Glossary P Flashcards

1
Q

P12 (Public Key Cryptography Standard #12)

A

Format that allows a private key to be exported along with its digital certificate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

P7B

A

File format for transmitting a chain of digital certificates, using PKCS#7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

PaaS (Platform as a Service)

A

A computing method that uses the cloud to provide any platform-type services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

PAM (pluggable authentication module)

A

Framework for implementing authentication providers in Linux.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

passive scan

A

An enumeration or vulnerability scan that analyzes only intercepted network traffic rather than sending probes to a target. More generally, passive reconnaissance techniques are those that do not require direct interaction with the target.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

PAT (port address translation)

A

Maps private host IP addresses onto a single public IP address. Each host is tracked by assigning it a random high TCP port for communications. Also known as network address port translation (NAPT) or NAT overloading.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

patch management

A

Identifying, testing, and deploying OS and application updates. Patches are often classified as critical, security-critical, recommended, and optional.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

PCI DSS (Payment Card Industry Data Security Standard)

A

Information security standard for organizations that process credit or bank card payments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

PDU (power distribution unit)

A

Advanced strip socket that provides filtered output voltage. A managed unit supports remote administration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

PEAP (Protected Extensible Authentication Protocol)

A

EAP implementation that uses a server-side certificate to create a secure tunnel for user authentication, referred to as the inner method.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

PEM (privacy-enhanced mail)

A

Base64 encoding scheme used to store certificate and key data as ASCII text.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

penetration testing

A

A test that uses active tools and security utilities to evaluate security by simulating an attack on a system. A pen test will verify that a threat exists, then will actively test and bypass security controls, and will finally exploit vulnerabilities on the system. Also known as pentest.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

percent encoding

A

Mechanism for encoding characters as hexadecimal values delimited by the percent sign

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

persistence (load balancing)

A

In load balancing, the configuration option that enables a client to maintain a connection with a load-balanced server over the duration of the session. Also referred to as sticky sessions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

persistence

A

In cybersecurity, the ability of a threat actor to maintain covert access to a target host or network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

PFS (perfect forward secrecy)

A

A characteristic of transport encryption that ensures if a key is compromised the compromise will only affect a single session and not facilitate recovery of plaintext data from other sessions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

PFX (personal information exchange)

A

Windows file format for storing a private key and certificate data. The file can be password-protected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

pharming

A

An impersonation attack in which a request for a website, typically an e-commerce site, is redirected to a similar-looking, but fake, website.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

PHI (protected/personal health information)

A

Information that identifies someone as the subject of medical and insurance records, plus associated hospital and laboratory test results.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

phishing

A

A type of email-based social engineering attack, in which the attacker sends email from a supposedly reputable source, such as a bank, to try to elicit private information from the victim.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

physical control

A

A type of security control that acts against in-person intrusion attempts.

22
Q

PII (personally identifiable information)

A

Data that can be used to identify or contact an individual (or in the case of identity theft, to impersonate them).

23
Q

pinning

A

A deprecated method of trusting digital certificates that bypasses the CA hierarchy and chain of trust to minimize man-in-the-middle attacks.

24
Q

PIV card (personal identity verification card)

A

A smart card that meets the standards for FIPS 201, in that it is resistant to tampering and provides quick electronic authentication of the card’s owner.

25
Q

PKCS (public key cryptography standards)

A

Series of standards defining the use of certificate authorities and digital certificates.

26
Q

PKI (public key infrastructure)

A

Framework of certificate authorities, digital certificates, software, services, and other cryptographic components deployed for the purpose of validating subject identities.

27
Q

playbook

A

A checklist of actions to perform to detect and respond to a specific type of incident PLC (programmable logic controller) A type of computer designed for deployment in an industrial or outdoor setting that can automate and monitor mechanical systems.

28
Q

PNAC (port-based network access control)

A

A switch (or router) that performs some sort of authentication of the attached device before activating the port.

29
Q

pointer dereferencing

A

A software vulnerability that can occur when code attempts to read a memory location specified by a pointer, but the memory location is null. Also known as dereferencing.

30
Q

Point-to-Point/Point-to Multipoint Topology

A

A point-to-point topology is one where two nodes have a dedicated connection to one another. In a point-to-multipoint topology, a central node mediates links between remote nodes. Also known as Point-to-point.

31
Q

port forwarding

A

A process in which a router takes requests from the Internet for a particular application (such as HTTP) and sends them to a designated host on the LAN. Also known as destination network address translation or DNAT.

32
Q

port mirroring

A

Copying ingress and/or egress communications from one or more switch ports to another port. This is used to monitor communications passing over the switch. Also known as switched port analyzer or SPAN.

33
Q

port security

A

Preventing a device attached to a switch port from communicating on the network unless it matches a given MAC address or other protection profile.

34
Q

post-quantum

A

Anticipating challenges to current cryptographic implementations and general security issues in a world where threat actors have access to significant quantum processing capability.

35
Q

PowerShell

A

A command shell and scripting language built on the .NET Framework.

36
Q

PPP (Point to Point Protocol)

A

Dial-up protocol working at layer 2 (Data Link) used to connect devices remotely to networks.

37
Q

PPTP (Point-to-Point Tunneling Protocol)

A

Developed by Cisco and Microsoft to support VPNs over PPP and TCP/IP. PPTP is highly vulnerable to password cracking attacks and considered obsolete.

38
Q

private cloud

A

A cloud that is deployed for use by a single entity.

39
Q

private key

A

In asymmetric encryption, the private key is known only to the holder and is linked to, but not derivable from, a public key distributed to those with which the holder wants to communicate securely. A private key can be used to encrypt data that can be decrypted by the linked public key or vice versa.

40
Q

privilege access management

A

The use of authentication and authorization mechanisms to provide an administrator with centralized or decentralized control of user and group role-based privilege management.

41
Q

privilege escalation

A

The practice of exploiting flaws in an operating system or other application to gain a greater level of access than was intended for the user or application.

42
Q

provenance

A

In digital forensics, being able to trace the source of evidence to a crime scene and show that it has not been tampered with.

43
Q

proxy server

A

A server that mediates the communications between a client and another server. It can filter and often modify communications, as well as provide caching services to improve performance. Also known as forward proxy.

44
Q

pseudo-anonymization

A

Removing personal information from a data set to make identification of individuals difficult, even if the data set is combined with other sources.

45
Q

PSK (pre-shared key)

A

Passphrase-based mechanism to allow group authentication to a wireless network. The passphrase is used to derive an encryption key.

46
Q

PtH attack (pass the hash attack)

A

A network-based attack where the attacker steals hashed user credentials and uses them as-is to try to authenticate to the same network the hashed credentials originated on.

47
Q

public cloud

A

A cloud that is deployed for shared use by multiple independent tenants.

48
Q

public key

A

During asymmetric encryption, this key is freely distributed and can be used to perform the reverse encryption or decryption operation of the linked private key in the pair.

49
Q

PUP (potentially unwanted program)

A

Software that cannot definitively be classed as malicious, but may not have been chosen by or wanted by the user.

50
Q

purple team

A

A mode of penetration testing where red and blue teams share information and collaborate throughout the engagement. purpose limitation In data protection, the principle that personal information can be collected and processed only for a stated purpose to which the subject has consented.

51
Q

Python

A

High-level programming language that is widely used for automation