Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
31 Cards in this Set
- Front
- Back
- 3rd side (hint)
CRL |
Certificate Revocation List |
PKI |
|
OCSP |
Online certificate status protocol. Checks if certificate is good. |
Real time CRL |
|
PKI |
Public Key Infrastructure |
|
|
PKCS-7 |
A way to store certificates as individual files |
|
|
PKCS-12 |
Stores the certificates and the private keys as a package |
|
|
HMAC |
Hash-based Message Authentication Code |
|
|
MD5 |
Message Digest 5 |
|
|
SHA |
Secure Hash Algorithm |
|
|
DHCP |
Dynamic Host Configuration Protocol |
|
|
VDE |
Virtual Desktop Environment |
|
|
VDI |
Virtual Desktop Infrastructure |
|
|
SAML |
Security Assertion Markup Language |
|
|
XML |
Extensible Markup Language |
|
|
SIEM |
Security Information and Event Manager |
|
|
NAC |
Network Access Controller |
|
|
TPM |
Trusted Platform Module |
|
|
FDE |
Full Disk Encryption |
|
|
TOTP |
Time-based One Time Password |
|
|
HTOP |
HMAC-based One Time Password |
|
|
SDN |
Software Defined Network |
|
|
SRTP |
Secure Real-time Transport Protocol |
|
|
BIA |
Business Impact Analysis |
|
|
PFS |
Perfect Forward Secrecy |
|
|
CSR |
Certificate Signing Request |
|
|
SLE |
Single Loss Expectancy |
|
|
CASB |
Cloud Access Security Broker |
|
|
COBO |
Corporate owned business only |
|
|
COPE |
Corporate owned personally enabled |
|
|
CYOD |
Choose your own device |
|
|
BYOD |
Bring your own device |
|
|
UTM |
Unified Threat Management |
|