Access All Areas
Crypto Craze
Network Nuggets
Security Shenanigans
Tech Tidbits
100

The collection of access control entries (ACEs) that determines which subjects are allowed or denied access to the object and the privileges given.

What is Access Control Lists (ACL)?

100

Operations that transform a plaintext into a ciphertext with cryptographic properties, also called a cipher.

What is an Algorithm?

100

A type of wireless network where connected devices communicate directly with each other instead of over an established medium.

What is Ad hoc network?

100

Tracking authorized usage of a resource or use of rights by a subject and alerting when unauthorized use is detected or attempted.

What is Accounting?

100

Methods exposed by a script or program that allow other scripts or programs to use it.

What is Application programming interface (API)?

200

An authentication mechanism that allows a user to present a smart card to operate an entry system.

What are Access Badges?

200

A high performance mode of operation for symmetric encryption providing authenticated encryption with associated data.

What is AES Galois Counter Mode Protocol (GCMP)?

200

A port-based network access control (PNAC) mechanism that allows the use of EAP authentication when a host connects to an Ethernet switch.

What is EAP over LAN (EAPoL)?

200

Policies and processes that ensure asset and service purchases and contracts are fully managed, secure, use authorized suppliers/vendors, and meet business goals.

What is Acquisition/procurement?

200

A standalone hardware device that performs only the function of a firewall, which is embedded into the appliance’s firmware.

What is Appliance firewall?

300

A set of rules governing user security information, such as password expiration and uniqueness, which can be set globally.

What are account policies?
300

A type of network isolation that physically separates a host from other hosts or a network from all other networks.

What is Air-gapped?

300

A network monitoring system that detects changes in normal operating data sequences and identifies abnormal sequences.

What is Behavioral-based detection?

300

Detective and preventive security controls that use an agent or network configuration to monitor hosts.

What is Active security control?

300

A security configuration where access is denied to any entity unless the entity appears on a whitelist?

What is Allow list?

400

A secure entry system with two gateways, only one of which is open at any one time.

What is an access control vestibule?

400

Cipher that uses public and private keys, mathematically linked, using either RSA or ECC algorithms.

What is Asymmetric algorithm?

400

A software delivery model where the code runs on a server and is streamed to a client.

What is Application virtualization?

400

The science of creating machines with the ability to develop problem-solving and analysis strategies without significant human direction or intervention.

What is Artificial intelligence (AI)?

400

Inspecting traffic to locate and block viruses.

What is Antivirus?

500

A device that provides a connection between wireless devices and can connect to wired networks, implementing an infrastructure mode WLAN.

What are access point?

500

A method used to verify both the integrity and authenticity of a message by combining a cryptographic hash of the message with a secret key.

What is Hash-based Message Authentication Code (HMAC)?

500

A vulnerability testing tool designed to identify issues with application code and platform configuration?

What is Application vulnerability scanning?

500

An access control technique that evaluates a set of attributes that each subject possesses to determine if access should be granted.

What is Attribute-based access control (ABAC)?

500

The concept that most types of IT requirements can be deployed as a cloud service model.

What is Anything as a service (XaaS)?

M
e
n
u