Hell

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/95

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 7:37 AM on 4/3/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

96 Terms

1
New cards

Identity / Authentication

Verifies identity, determines permissions, and logs activity for users → AAA

2
New cards

MFA

Requires multiple independent credentials (ex: password + phone)

3
New cards

SSO

Allows one login to access multiple systems

4
New cards

LDAP

Directory protocol used to query and manage users/devices

5
New cards

SAML

Exchanges authentication data (often for SSO) using XML

6
New cards

OAuth

Delegates access without sharing credentials (used in APIs)

7
New cards

OIDC

Adds authentication layer on top of OAuth

8
New cards

PAP

Sends passwords in plain text for authentication

9
New cards

CHAP

Uses challenge/response to avoid sending passwords directly

10
New cards

RADIUS

Centralized authentication system used in networking devices

11
New cards

TACACS+

More secure centralized authentication with full packet encryption

12
New cards

HSM

Hardware-based secure key storage and cryptographic operations

13
New cards

OTP

Generates a temporary, one-time login code

14
New cards

FIDO

Passwordless authentication using biometrics or tokens

15
New cards

TCP

Ensures reliable, ordered data transmission between hosts

16
New cards

UDP

Sends fast, connectionless data without guarantees

17
New cards

IP

Provides logical addressing and routing of packets

18
New cards

NAT

Translates private IPs to public IPs for internet access

19
New cards

PAT

Uses port numbers to map multiple devices to one IP

20
New cards

DNS

Resolves domain names to IP addresses

21
New cards

DHCP

Automatically assigns IP configuration to devices

22
New cards

ARP

Maps IP addresses to MAC addresses on a LAN

23
New cards

ICMP

Sends error messages and diagnostic info (ex: ping)

24
New cards

SNMP

Collects and manages network device information

25
New cards

SMB

File and printer sharing protocol (Windows)

26
New cards

FTP

Transfers files between systems (unencrypted)

27
New cards

SFTP

Secure file transfer over SSH

28
New cards

TFTP

Simple file transfer with no authentication

29
New cards

HTTP

Transfers web data between client and server

30
New cards

HTTPS

Encrypts web traffic using TLS

31
New cards

NTP

Synchronizes system time across networks

32
New cards

SSL

Legacy encryption protocol for securing communications

33
New cards

TLS

Modern encryption protocol replacing SSL

34
New cards

IPsec

Secures IP communications using encryption/authentication

35
New cards

ESP

Encrypts payload data in IPsec tunnels

36
New cards

AH

Provides integrity/authentication for IP packets

37
New cards

SSH

Secure remote command-line access

38
New cards

AES

Symmetric encryption standard widely used today

39
New cards

DES

Older symmetric encryption standard (insecure)

40
New cards

3DES

Applies DES encryption three times for more security

41
New cards

RSA

Asymmetric encryption used for key exchange/digital signatures

42
New cards

ECC

Efficient asymmetric encryption using elliptic curves

43
New cards

PKI

Framework for managing digital certificates and keys

44
New cards

CA

Issues and verifies digital certificates

45
New cards

CRL

List of revoked/invalid certificates

46
New cards

OCSP

Real-time certificate validation service

47
New cards

PFS

Ensures session keys are not compromised if long-term key is exposed

48
New cards

DoS

Overwhelms a system with traffic from one source

49
New cards

DDoS

Overwhelms a system using many distributed sources

50
New cards

MITM

Intercepts and potentially alters communication between parties

51
New cards

XSS

Injects malicious scripts into web pages

52
New cards

SQLi

Injects malicious SQL queries into a database

53
New cards

CSRF

Tricks a user into performing unintended actions on a site

54
New cards

RCE

Executes malicious code remotely on a system

55
New cards

APT

Long-term, targeted attack by a skilled adversary

56
New cards

RAT

Malware that provides remote control of a system

57
New cards

BOT

Network of infected devices controlled remotely

58
New cards

C2

Server used by attackers to control compromised systems

59
New cards

Vishing

Phishing attack using phone calls

60
New cards

Smishing

Phishing attack using text messages

61
New cards

IDS

Monitors network traffic and alerts on suspicious activity

62
New cards

IPS

Actively blocks malicious traffic in real time

63
New cards

SIEM

Aggregates and analyzes logs for threat detection

64
New cards

SOAR

Automates incident response and security workflows

65
New cards

EDR

Detects and responds to threats on endpoints

66
New cards

XDR

Correlates threats across endpoints, network, and cloud

67
New cards

DLP

Prevents sensitive data from leaving the organization

68
New cards

CASB

Controls access to cloud services and enforces policies

69
New cards

NGFW

Firewall with advanced inspection (application awareness)

70
New cards

WAF

Filters and protects web applications from attacks

71
New cards

NAC

Controls device access to the network based on policy

72
New cards

IaaS

Provides virtualized computing infrastructure

73
New cards

PaaS

Provides platform for app development without managing hardware

74
New cards

SaaS

Provides software accessible over the internet

75
New cards

VPC

Isolated virtual network within a cloud environment

76
New cards

VPN

Secure tunnel for remote network access

77
New cards

SDN

Centralized network control using software

78
New cards

SASE

Combines networking and security into a cloud-delivered service

79
New cards

ZTNA

Enforces strict identity-based access (no implicit trust)

80
New cards

CIA

Core principles of securing data (protect, ensure accuracy, ensure access)

81
New cards

GRC

Framework for managing risk and compliance

82
New cards

GDPR

EU regulation for data protection/privacy

83
New cards

HIPAA

US law protecting healthcare data

84
New cards

PCI DSS

Standard for securing payment card data

85
New cards

SOX

US law for financial reporting integrity

86
New cards

AUP

Defines acceptable user behavior on systems

87
New cards

SLA

Defines expected service performance levels

88
New cards

MOU

Agreement outlining mutual responsibilities

89
New cards

NDA

Protects confidential information legally

90
New cards

BIA

Identifies impact of business disruptions

91
New cards

DRP

Plan to restore IT systems after disaster

92
New cards

BCP

Plan to maintain operations during disruption

93
New cards

PUP

Potentially unwanted software bundled with installs

94
New cards

DLL

Shared library used by programs in Windows

95
New cards

EXE

Executable program file

96
New cards

MSI

Installer package for Windows software

Explore top notes

note
Lecture 13A: Paleozoic Life
Updated 236d ago
0.0(0)
note
Gravitation and Circular Motion
Updated 1083d ago
0.0(0)
note
Chapter 11: Stockholders' Equity
Updated 812d ago
0.0(0)
note
chapter 4: a&p (tissues)
Updated 661d ago
0.0(0)
note
APES Unit 2 - Biodiversity
Updated 546d ago
0.0(0)
note
Lecture 13A: Paleozoic Life
Updated 236d ago
0.0(0)
note
Gravitation and Circular Motion
Updated 1083d ago
0.0(0)
note
Chapter 11: Stockholders' Equity
Updated 812d ago
0.0(0)
note
chapter 4: a&p (tissues)
Updated 661d ago
0.0(0)
note
APES Unit 2 - Biodiversity
Updated 546d ago
0.0(0)

Explore top flashcards

flashcards
global Quiz
39
Updated 1053d ago
0.0(0)
flashcards
ap psych unit 7
73
Updated 1143d ago
0.0(0)
flashcards
Westward Expansion
29
Updated 1139d ago
0.0(0)
flashcards
latin vocab 1-30
28
Updated 754d ago
0.0(0)
flashcards
Chem Ch.4 Element Info
30
Updated 1283d ago
0.0(0)
flashcards
global Quiz
39
Updated 1053d ago
0.0(0)
flashcards
ap psych unit 7
73
Updated 1143d ago
0.0(0)
flashcards
Westward Expansion
29
Updated 1139d ago
0.0(0)
flashcards
latin vocab 1-30
28
Updated 754d ago
0.0(0)
flashcards
Chem Ch.4 Element Info
30
Updated 1283d ago
0.0(0)