Mile2 Cybersecurity Certifications

Flashcard Set 1

How to use the flashcards:

Click anywhere on the flashcard to reveal the answer.

Click on the arrows at the bottom of the flashcard set to move between flashcards.

Each flashcard set has 5 flashcards.

Define: Access Profile

An access profile is information about a user that is stored on a computer, including their password and name as well as what they are allowed access to.

Define: Access point

An access point is a computer networking device which allows a wi-fi compliant device to connect to a wired network and usually connects via a router.

Define: Acceptable use policy

Acceptable use policy is a policy that defines the level of access and degree of use of the organization’s network or internet by the members of an organization.

Define: Access path

An access path is a logical order that directs to the location on the computer where an object such as webpage, file etc., is stored.

What is an access control list?

A set of rules or instructions to inform the operating system about the access constraints for users or user groups, so that the operating system knows whether or not a user id has permission to access a file or a directory.

Define: Transmission control protocol tcp

Transmission control protocol (tcp) is a set of rules or protocol that is used along with the internet protocol to send data in the form of message units between computers over the internet. Whereas the ip protocol deals only with packets, tcp enables two hosts to establish a connection and exchange streams of data. Tcp takes care of keeping track of the individual units of data called packets. Tcp guarantees delivery of data and also guarantees that packets will be delivered in the same order in which they were sent. It originated in the initial network implementation in which it complemented the internet protocol (ip). Therefore, the entire suite is commonly referred to as tcp/ip.

Define: Transport layer security tls

Transport layer security (tls) is a protocol that ensures privacy between communicating applications and the users on the internet. When a server and client communicate, tls ensures that no third party may overhear or tamper with any message. Tls is the successor to the secure sockets layer (ssl).

Define: Transport layer security tls

Transport layer security (tls) is a protocol that ensures privacy between communicating applications and the users on the internet. When a server and client communicate, tls ensures that no third party may overhear or tamper with any message. Tls is the successor to the secure sockets layer (ssl).

Define: Triple des

Triple des (3des) is the common name for the triple data encryption algorithm (tdea or triple dea) symmetric-key block cipher, which applies the data encryption standard (des) cipher algorithm three times to each data block. It transforms each 64-bit plaintext block by applying the des three successive times, using either two or three different keys, for an effective key length of 112 or 168 bits.

Define: Triple wrapped

Triple wrapped describes any data that has been signed with a digital signature, encrypted, and then signed again is called triple-wrapped.

Define: Advanced encryption standard aes

An advanced data encryption algorithm that employs key sizes of variable length in the range of 128 – 256 bits. Advanced encryption standards help protect highly sensitive data such as financial information, and classified government records.

Define: Administrative Safeguards

Administrative safeguards are a special set of the hipaa security rules. Administrative safeguards focus on internal organization, policies and procedures and the maintenance of security managers which are in place to protect sensitive patient information.

Define: Ad hoc network

An ad hoc network is a local area network (lan) that spontaneously builds as devices connect. An ad hoc network does not rely on a base station to coordinate different points, rather the individual base nodes forward packets to and from each other.

Define: Active security testing

Active security testing is security testing which involves directly interacting with a target, such as sending packets

Define: Active Security Testing

Active security testing is security testing which involves directly interacting with a target, such as sending packets

Define: Alert Situation

An alert situation is when the interruption in an enterprise is not resolved even after the competition of the threshold stage, an alert situation requires the enterprise to start escalation procedure.

Define: Adware

Adware is software distributed to the user free of cost with advertisements embedded into them. As such, it displays advertisements, and redirects your queries to sponsor’s websites. Adware helps advertisers collect data for marketing purposes, without your permissions to do so. A user can disable ad pop-ups by purchasing a registration key.

Define: Adversary

An adversary is a process, user or device that possesses a threat to the network.

Define: Advanced persistent threat

Advanced persistent threat is a user or a program that has highly sophisticated techniques and intends to pursue them with a malicious intent.

Define: Advanced penetration testing

Advanced penetration testing is the process of testing a network to discover vulnerabilities which make it open to harmful intruders; then addressing and remedying the issues.

Define: App attack

An app attack occurs when a user unknowingly installs a harmful app on their tablet or smartphone and the app in turn steals their personal data.

Define: Anti virus software

Antivirus software is a program or a set of programs that help prevent any malicious object, code, program from entering your computer or network. If any such malicious programs enter your computer, antivirus software helps detect, quarantine, or remove such programs from the computer or networks.

Define: Anti malware

Anti-malware is a program designed to protect computers and networks against any threats or attacks from viruses such as adware, spyware, and any such other malicious programs.

Define: Alternate process

An alternate process is a back-up process devised to help continue a business critical process without any interruption, from the time the primary enterprise system breaks down to the time of its restoration.

Alternate facilities

Alternate facilities are secondary facilities including offices, data processing centers etc., from where high- priority emergency tasks can be performed, delivered when primary facilities are interrupted, unavailable.

Attack

An attack is an action with malicious intention to interrupt the operations of a network or steal the data, etc.

Define: Asymmetric key public key

An asymmetric key (public key) is a security measure that uses two keys to ensure the confidentiality of a message. One key encrypts the message, while the other key decrypts it.

Define: Asset

An asset is the resources of an organization, business either having tangible value – finance, infrastructure, physical properties, human resource – or of intangible value such as goodwill that helps business and can be converted to cash for future use.

Define: Architecture

Architecture is a structure that defines or describes the very fundamentals of a system or an organization, its components, the relationship between each of these components, their relationship to the overall system, and finally, their effectiveness in guiding the system towards its goals.

Define: Application layer

An application layer is one of the seven layers in the open-system interconnection (osi) model of the tcp/ip protocol suite. Application layer defines the way process-to-process communication happens in a network; it only offers a strong communication interface and end user services.

SUPPORT

Please Note:

The support ticket system is for technical questions and post-sale issues.

 

If you have pre-sale questions please use our chat feature or email information@mile2.com .