Security + E Flashcards

(10 cards)

1
Q

EAP (Extensible Authentication Protocol):

A

EAP is an authentication framework that defines how authentication information is exchanged during a network connection. It is often used in wireless networks and point-to-point connections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ECB (Electronic Code Book): ECB is a mode of operation for symmetric key block ciphers

A

where each block of plaintext is encrypted independently using the same key. This simplicity makes it vulnerable to attacks that exploit repeated plaintext patterns

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ECC (Elliptic Curve Cryptography):

A

ECC is a public-key cryptography algorithm based on the algebraic structure of elliptic curves over finite fields. It offers stronger security with smaller key sizes compared to traditional methods like RSA.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ECDHE (Elliptic Curve Diffie-Hellman Ephemeral): ECDHE is a key exchange algorithm based on elliptic curve cryptography

A

allowing two parties to establish a shared secret over an insecure channel. The “ephemeral” aspect means the keys used are unique to each session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

ECDSA (Elliptic Curve Digital Signature Algorithm): ECDSA is a digital signature algorithm that leverages elliptic curve cryptography to create digital signatures. It’s used to verify the authenticity and integrity of digital messages and is commonly used in applications like secure messaging

A

ECDSA is a digital signature algorithm that leverages elliptic curve cryptography to create digital signatures. It’s used to verify the authenticity and integrity of digital messages and is commonly used in applications like secure messaging.cryptocurrencies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

EDR (Endpoint Detection and Response):

A

EDR is a cybersecurity solution that focuses on detecting and investigating malicious activities on endpoints like computers and servers. EDR tools gather data from endpoints, analyze it for suspicious patterns, and provide response capabilities to contain and remediate threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

EFS (Encrypted File System): EFS provides encryption for files and directories on NTFS file system volumes

A

offering an additional layer of security beyond access controls. It uses a public-key system to encrypt individual files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

ERP (Enterprise Resource Planning): ERP is a type of software used by organizations to manage their core business processes

A

ERP is a type of software used by organizations to manage their core business processes, such as accounting, procurement, project management, and supply chain operations. ERP systems integrate these functions into a single system, providing a centralized data repository and real-time insights.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

ESN (Electronic Serial Number):

A

ESN is a unique identification number assigned to mobile devices, particularly CDMA phones. It’s used for identification and authentication purposes and is programmed into the device during manufacturing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

ESP (Encapsulating Security Payload):

A

ESP is a protocol within the IPsec suite that encrypts and authenticates data packets exchanged between devices using a VPN. It provides confidentiality and optional authentication services, operating in either Transport Mode (encrypting data payload) or Tunnel Mode (encrypting the entire packet).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly