SY0-701 : Objective 3.0 Flashcards

(56 cards)

1
Q

RPO

A

Recovery Point Objective (RPO)
- represents the maximum acceptable amount of data loss measured in time
- if an organization has a RPO of 4 hours, it means the business can tolerate a data loss of up to 4 hours

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

RTO

A

Recovery Time Objective (RTO)
- represents the maximum acceptable length of time the can elapse before the lack of a business function severely impacts the organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

MTBF

A

Mean Time Between Failure (MTBF)
- the average time between repairable failures of a technology product

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

SCADA

A

Supervisory Control and Data Acquisition (SCADA)
- a computerized system that monitors and controls industrial processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

ICS

A

Industrial Control System (ICS)
- involves the strategies and practices to safeguard the critical infrastructure and operational technology (OT) systems employed in several industries, such as manufacturing, energy, and transportation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

IoT

A

Internet of Things (IoT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

FDE

A

Full Disk Encryption (FDE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

SDN

A

Software-defined Networking (SDN)
- an architecture that abstracts different, distinguishable layers of a network to make networks agile and flexible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

IaC

A

Infrastructure as Code (IaC)
- modern approach to IT infrastructure management that involves the automating the provisioning and management of computing resources through machine readable definition files or scripts
- process that automates the provisioning and management of cloud resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

RTOS

A

Real-time Operating System (RTOS)
- a software system that manages tasks in real-time systems that have strict timing constraints

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

PDU

A

Power Distribution Unit (PDU)
- device that manages the power supply for computer networks, data centers, and other industrial environments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

PPTP

A

Point-to-Point Tunneling Protocol (PPTP)
- a network protocol that enables the secure transfer of data from a remote client to a private enterprise server by creating a virtual private network (VPN) across TCP/IP-based data networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

IPSec

A

Internet Protocol Security (IPSec)
- protocol suite used to secure IP communications by authenticating and encrypting each IP packet in data stream

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

UPS

A

Uninterruptable Power Supply (UPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

EAP

A

Extensible Authentication Protocol (EAP)
- an authentication framework that allows for the use of different authentication methods for secure network access technologies
- provides common functions and negotiation of authentication protocols and is used in wireless networks and point-to-point connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

PEAP

A

Protected Extensible Authentication Protocol (PEAP)
- provides a method to transport securely authentication data, including legacy password-based protocols, via 802.11 Wi-Fi networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

EAP-TTLS

A

Extensible Authentication Protocol-Tunnel Transport Layer Security (EAP-TTLS)
- authentication protocol that extends TLS support across multiple platforms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

LEAP

A

Lightweight Extensible Authentication Protocol (LEAP)
- a proprietary wireless LAN authentication method developed by Cisco Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

PSK

A

Pre-shared Key (PSK)
- a string of characters used for authentication and encryption in wireless networks and Virtual Private Networks (VPNs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

IKE

A

Internet Key Exchange (IKE)
- a secure key management protocol that is used to set up a secure, authenticated communications channel between two devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

ICMP

A

Internet Control Message Protocol (ICMP)
- a protocol that devices within a network use to communicate problems with data transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

AH

A

Authentication Header (AH)
- A deprecated IPsec security protocol that provides integrity protection (but not confidentiality) for packet headers and data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

UTM

A

Unified Threat Management (UTM)
- an information security term that refers to a single security solution, and usually a single security appliance, that provides multiple security functions at a single point on the network

24
Q

CHAP

A

Challenge Handshake Authentication Protocol (CHAP)
- a challenge and response authentication method that Point-to-Point Protocol (PPP) servers use to verify the identity of a remote user

25
PPP
Point-to-Point Protocol (PPP) - a data link layer (layer 2) communication protocol between two routers directly without any host or any other networking in between
26
SPF
Sender Policy Framework (SPF) - email authentication method designed to prevent forging sender addresses during email delivery
27
DKIM
Domain Key Identified Mail (DKIM) - allows the receiver to check if the email was actually sent by the domain it claims to be sent from and if the content was tampered with during transit
28
DMARC
Domain-based Message Authentication Reporting & Conformance (DMARC) - an email authentication, policy, and reporting protocol, helps to prevent email spoofing and phishing
29
S/MIME
Secure/Multipurpose Internet Mail Extensions (S/MIME) - an email encryption and signing industry standard widely used by corporations to enhance email security
30
NGFW
Next-generation Firewall (NGFW) - are deep-packet inspection firewalls that move beyond port/protocol inspection and blocking to add application-level inspection, intrusion prevention, and bringing intelligence from outside the firewall
31
SASE
Secure Access Service Edge (SASE) - an architecture that delivers converged network and security as a service capabilities including SD-WAN and cloud native security functions such as secure web gateways, cloud access security brokers, firewall as-a-service, and zero-trust network access
32
SD-WAN
Software-defined Wide Area Network (SD-WAN) - virtual WAN architecture that allows enterprises to leverage any combination of transport services — including MPLS, LTE and broadband internet services — to securely connect users to applications
33
COOP
Continuity of Operation Planning (COOP) - A predetermined set of instructions or procedures that describe how an organization's mission essential functions will be sustained within 12 hours and for up to 30 days as a result of a disaster event before returning to normal operations
34
PCI DSS
Payment Card Industry Data Security Standard (PCI DSS)
35
GDPR
General Data Protection Regulation (GDPR)
36
ESP
Encapsulated Security Payload (ESP) - which is a protocol that encrypts and authenticates data packets between devices, part of the IPSec suite of protocols
37
HVAC
Heating, Ventilation Air Conditioning (HVAC)
38
MPLS
Multi-protocol Label Switching (MPLS) - a networking technology that routes traffic using the shortest path based on “labels,” rather than network addresses, to handle forwarding over private wide area networks, but it doesn't have encryption by default
39
HA
High Availability (HA)
40
Role BAC
Role-based Access Control (Role BAC) - a cybersecurity method that limits access to systems and networks based on a user's role within an organization
41
DAC
Discretionary Access Control (DAC) - a cybersecurity model that gives the owner of a resource control over who can access it
42
MAC
Mandatory Access Control (MAC) - a cybersecurity model that restricts access to system resources based on a user's authorization level and the sensitivity of the information
43
Rule BAC
Rule-based Access Control (Rule BAC) - a system that uses pre-defined rules to determine if a user has access to network resources.
44
NAT
Network Address Translation (NAT) - a routing technique that allows private IP networks to connect to the internet by translating private IP addresses to public IP addresses
45
L2TP
Layer 2 Tunneling Protocol (L2TP) - an extension of the Point-to-Point Tunneling Protocol (PPTP) used by internet service providers (ISPs) to enable virtual private networks (VPNs)
46
RAS
Remote Access Server (RAS) - a system that allows users to connect to a network remotely, as if they were physically present
47
TACACS+
Terminal Access Controller Access Control System (TACACS+) - a network security protocol designed to offer centralized authentication, authorization, and accounting services for remote access servers
48
PAP
Password Authentication Protocol (PAP) - a point-to-point protocol (PPP) authentication method that uses passwords to validate users
49
PFS
Perfect Forward Security (PFS) - also called forward secrecy (FS), refers to an encryption system that changes the keys used to encrypt and decrypt information frequently and automatically
50
IRP
Incident Response Plan (IRP) - a written document, formally approved by the senior leadership team, that helps your organization before, during, and after a confirmed or suspected security incident.
51
NTP
Network Time Protocol (NTP) - an internet protocol used to synchronize with computer clock time sources in a network
52
MTTF
Mean Time to Failure (MTTF)
53
MTTR
Mean Time To Repair (MTTR) - represents the average time required to repair a failed component or system
54
SMTP
Simple Mail Transfer Protocol (SMTP)
55
SMTPS
Simple Mail Transfer Protocol Secure (SMTPS)
56
IaaS
Infrastructure as a Service (IaaS)