P Flashcards

1
Q

P12

A

PKCS #12

This format allows for the storage of both public and
private keys in open or encrypted form.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

P2P

A

Peer to Peer

A headless file sharing system that has no centralized
point of control and facilitates wide-open file sharing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

PaaS

A

Platform as a Service

A form of access that allows an organization to create
and run its own applications on the cloud.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

PAC

A

Proxy Auto Configuration

A JavaScript based technology that regulates the
configuration of browsers and their use of web proxies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

PAM

A

Pluggable Authentication Modules

Dynamically, loadable authentication libraries used on
Linux.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

PAP

A

Password Authentication Protocol

This is an insecure authentication protocol, sometimes
used between routers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

PAT

A

Port Address Translation

Address translation that multiplexes many internal
addresses through one or a few external address, linking
connections based upon the source port.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Patch

management

A

Configuration and baseline maintenance

An application designed to identify compliance
deviations and variance from a baseline, and then rectify
it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

PBKDF2

A

Password-based Key Derivation Function 2

This cryptographic function, processes, and otherwise
insecure secret through repeated rounds of hashing to
create a longer key value.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

PBX

A

Private Branch Exchange

The point of interface between the public switched
telephone network and an organization’s internal
telephony.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

PCAP

A

Packet Capture

Sniffing and recording network data into a file for later
analysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

PCI DSS

A

Payment Card Industry Data Security Standard

A nongovernmental security standard that regulates the
implementation and security of web payment gateways.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

PDU

A

Power Distribution Unit

This is a multiple output device that regulates the power
supply and its quality to multiple devices within a rack
of devices in a data center.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

PE

A

Portable Executable

This is a format for code run by Windows systems and
32 or 64 bit mode.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

PEAP

A

Protected Extensible Authentication Protocol

An EAP form that sends MSCHAP credentials secured
within a TLS envelope.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

PED

A

Portable Electronic Device

Small electronics, such as beepers, calendars and note
applications used prior to smartphones.

17
Q

PEM

A

Privacy-enhanced Electronic Mail

This is one of the oldest formats of certificates and uses
Base64.

18
Q

PFS

A

Perfect Forward Secrecy

This is the property of Key management where in the
loss of one key is not in danger data encrypted with
earlier session keys.

19
Q

PFX

A

Personal Exchange Format

A binary format for storing or sending server certificates
and private keys.

20
Q

PGP

A

Pretty Good Privacy

A widely used cryptosystem initially used for securing
email by encryption and digital signatures.

21
Q

PHI

A

Personal Health Information

Typically sensitive information regarding the health of
an individual.

22
Q

Phishing

A

Malicious spam

Bogus messaging sent to a wide array of potential
targets.

23
Q

PII

A

Personally Identifiable Information

This is data or pieces of data that uniquely correspond to
or identify one individual and requires special handling.

24
Q

PIN

A

Personal Identification Number

Knowledge-based authentication using a single value or
number.

25
PIV
Personal Identity Verification An identification card that contains a photograph, RFID, barcode, and cryptographically stored PKI information.
26
Pivot
Staging new attack Gaining control of one application or host in order to manipulate a secondary target.
27
PKCS
Public Key Cryptography Standards Public-key encryption standards developed by RSA Security.
28
PKI
Public Key Infrastructure The processes and management associated with the identification and validation of certificates and public keys.
29
PoC
Proof of Concept An implementation of an idea or theory that establishes its validity commonly associated with vulnerabilities and exploits.
30
POODLE
Padding Oracle on Downgrade Legacy Encryption An attack technique that could subvert confidentiality in an SSL connection.
31
POP
Post Office Protocol This protocol listens on TCP/110 and downloads messages from the server.
32
Port scan
Network mapping and service enumeration Performing address and host discovery, along with identifying listening applications.
33
POTS
Plain Old Telephone Service The old form of telephony that implemented dedicated copper connections vs. packet advised voice transmission.
34
PPP
Point-to-Point Protocol This is a layer 2 technology implemented to facilitate communication between endpoints or routers.
35
PPTP
Point-to-Point Tunneling Protocol A largely deprecated protocol used for establishing tunnels and securing packet ice communication.
36
PSK
Pre-shared Key Managing key establishment and management by using pre-established relationships and non-automatic exchange methods.
37
PUP
Potentially Unwanted Program Defined by policy, this is software that provides functionality in violation of authorized use.