I Flashcards

(31 cards)

1
Q

IaaS

A

Infrastructure as a Service

Implementing cloud-based networks, servers and other
infrastructure. user manages the most.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

IAM

A

Identity and Access Management

The policies, procedures and technologies that facilitate
ensuring that only the appropriate personnel have access
to resources in an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ICMP

A

Internet Control Message Protocol

A multifunctional protocol designed to perform network
testing and report errors. (ping)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ICS

A

Industrial Control Systems

Semi-intelligent devices used to control industrial or
scientific equipment from central consoles.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

IDEA

A

International Data Encryption Algorithm

This is a symmetric cipher that is block-oriented, with
the key size of 128 bits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

IDF

A

Intermediate Distribution Frame

The wiring panels linked by risers between floors to
perform cross-connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

IdP

A

Identity Provider

A service that contain subjects and can perform
centralized authentication on behalf of service
providers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

IDS

A

Intrusion Detection System

A generic term referring to generating alerts four
malicious activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

IEEE

A

Institute of Electrical and Electronics Engineers

The mission of the IEEE is to promote and develop
technological advances for the benefit of humanity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

IKE

A

Internet Key Exchange

This is used prior to IPSEC for the negotiation,
exchange and management of symmetric key
information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

IM

A

Instant Messaging

A class of online chat that offers real-time transmission
of messages over the Internet and local area networks.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Image

A

Drive cloning

The archival of information, bit by bit, or sector by
sector to alternative media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

IMAP4

A

Internet Message Access Protocol v4

This application listens on TCP/143 and it is clear text
form.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Incremental

BU

A

Incremental backup

It moves files to alternative media that have the archive
bit set, and then it clears it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Input

validation

A

Inspection or sanitation

The verification of programmatic input to an
application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

IoC

A

Indicators of Compromise

Artifacts and other forensic data that may be used to
identify illicit activity, malware and data breaches.

17
Q

IoT

A

Internet of Things

A reference to network devices that typically have little
defensive capability.

18
Q

IP

A

Internet Protocol

A layer 3 system for addressing, fragmenting,
reassembly and delivery of datagrams.

19
Q

IPS

A

Intrusion Prevention System

A security measure designed to detect as well as prevent
threats from advancing or escalating.

20
Q

IPSec

A

Internet Protocol Security

Generally considered the most secure remote access
protocol.

21
Q

IPv6

A

Internet Protocol version 6

Greatly expands the address in space, provides for
simplified headers and has hexadecimal addressing.

22
Q

IR

A

Incident Response

A generic reference to steps to be taken after specific
adverse events occur.

23
Q

IRC

A

Internet Relay Chat

A protocol commonly implemented by helpdesks and
Bots.

24
Q

IRP

A

Incident Response Plan

Devised plans to be implemented upon the
manifestation of a specific threat.

25
ISA
Interconnection Security Agreement The agreed-upon measures, settings and protocols taken by two organizations to facilitate communication.
26
ISFW
Internal Segmentation Firewall A network firewall placed on the intranet to separate two different security zones.
27
ISO
International Organization for Standardization An international nonprofit organization that develops and publishes standards.
28
ISP
Internet Service Provider An organization that facilitates access to a worldwide digital network.
29
ISSO
Information Systems Security Officer An organizational role charged with developing, implementing, testing and reviewing IT security.
30
ITCP
IT Contingency Plan Minimizing risk by identifying threats of the vulnerabilities in the appropriate measures to limit or prevent them.
31
IV
Initialization Vector This is a random number that augments a secret key to enhance security for a session.