Practice 5 COPY Flashcards
UPS
Uninterruptible power supply
VNC
Virtual Network Client
TACACS+
Terminal Access Controller Access-Control System Plus
RADIUS
Remote Access Dial In User Service
RADIUS
Remote Access Dial In User Service
ISAKMP
Internet Security Association and Key Management
ISAKMP
Internet Security Association and Key Management
PCI-DSS
Payment Card Industry Data Security Standard
PCI-DSS
Payment Card Industry Data Security Standard
AES
Advanced Encryption Standard
COBO
CYOD
COPE
BYOD
Company Owned/Business Only
Choose Your Own Device
Company Owned/Personally Enabled
Bring Your Own Device
AES
Advanced Encryption Standard
A significant over-voltage event that occurs for a very short period of time. Usually lasts for less than three nanoseconds.
Power Spike
A sudden increase in voltage that lasts for three nanoseconds or more.
Power Surge
A total loss of power
Power Failure/Loss
DLP
Data Loss Prevention
The shape or structure of a network in a physical or logical format as depicted in a network diagram.
Network Topology
When a vender is aware of a security flaw, but a patch has not been developed, a malicious actor can craft an attack and take advantage of the vulnerability. What type of attack is this?
Zero-Day
A physical security access control system comprising a small space with two sets of interlocking doors, such that the first set of doors must close before the second set opens.
Access Control Vestibule
A placeholder in a script containing a number, character, or string of characters. They do not have to be declared but can be assigned a value
Variable
A hardware token that generates a random number code synchronized to a code on the server. The code changes every 60 seconds or so.
Key Fob
A small device that can operate with or without an operating system installed on the client device. This device can instead boot directly from a network-based operating system on a common server and access applications on the company’s application server.
Thin Client
RFC
Request for Change
When a scammer pretends to be someone else to steal data or money or to spread malware
Spoofing