Busy. Please wait.

show password
Forgot Password?

Don't have an account?  Sign up 

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
We do not share your email address with others. It is only used to allow you to reset your password. For details read our Privacy Policy and Terms of Service.

Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

Remove ads
Don't know
remaining cards
To flip the current card, click it or press the Spacebar key.  To move the current card to one of the three colored boxes, click on the box.  You may also press the UP ARROW key to move the card to the "Know" box, the DOWN ARROW key to move the card to the "Don't know" box, or the RIGHT ARROW key to move the card to the Remaining box.  You may also click on the card displayed in any of the three boxes to bring that card back to the center.

Pass complete!

"Know" box contains:
Time elapsed:
restart all cards

Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

Security+ Terms

3DES Triple Data Encryption Standard - Symmetric encryption algorithm that encrypts data by processing each block of data 3 times using different DES keys each time. 168 bits in length.
HMAC Hash-Based Message Authentication Code - an algorithm that implements a partial digital signature that guarantees the integrity of a message during transmission, but does not provide for nonrepudiation. Uses a secret key with a hashing algorithms.
List 7 Symmetric Key algorithms DES, 3DES, RC4, IDEA, AES, Twofish, Blowfish
RC4 Rivest Cipher 4 - 128bit stream cipher used with SSL, RDP, WEP, WPA, and more. The predictable nature of the key led to the replacement of WEP to WPA
OTP One Time Pad - type of encryption that, when used to the letter is impossible to actually crack without knowing the key (the pad). Each character of plaintext encrypted by a modular addition from a secret key. Oldest form of Cryptography.
Blowfish Symmetric key block cipher that puts 64bit blocks of data through 16 rounds of cryptographic functions using a key length that can vary from 32 to 448bits in size. Alternative to DES. Still used with no successful attack discovered.
TwoFish Works with 128bit blocks of data. block cipher, but the maximum length of the keys used for encryption cant exceed 256bits
PGP Pretty Good Privacy - method of securing emails, created to prevent attackers from intercepting and manipulating email and attachments by encrypting and digitally signing the contents of the email using public key cryptography. Employs DSA, RSA, MD5, SHA
IDEA International Data Encryption Standard
IPSec Internet Protocol Security
AES Advanced Encryption Standard
AH Authentication Header
ALE Annualized Loss Expectancy
ARO Annual Rate of Occurance
SSO Single Sign On
BCP Business Continuity Planning
BIA Business Impact Analysis
CCMP Chaining Message Authentication Protocol
CIA Confidentiality Integrity Availability
DAC Discretionary Access Control
EAP Extensible Authentication Protocol
ECC Elliptic Curve Cryptography
FTPS File Transfer Protocol Secure
SFTP Secure File Transfer Protocol
S/MIME Secure Multipurpose Internet Mail Extensions
SHA-1 Secure Hash Algorithm
TTLS Tunel Transport Layer Security
TACACS Terminal Access Controller Access Control System
TPM Trusted Platform Module
TKIP Temporal Key Integrity Protocol
RSA Rivest Shamir Adleman
RIPEMD-160 RACE Integrity Primitives Evaluation Message Digest
RBAC Role Based Access Control
PSK Pre Shared Key
PKI Public Key Infrastructure
PEAP Protected Extensible Authentication Protocol
PAP Password Authentication Protocol
GPG Gnu Privacy Guard
IKE Internet Key Exchange
L2F Layer 2 Forwarding
LBAC Lattice Based Access Control
LDAP Light-weight Directory Access Protocol
LEAP Light-weight Extensible Authentication Protocol
MD5 Message Digest
DES Data Encryption Standard
ARP Address Resolution Protocol
CAC Common Access Card
CCD Charge Coupled Device
CCTV Closed Circuit Television
CRL Certificate Revocation List
CSRF or XSRF Cross Site Request Forgery
DAM Database Activity Monitoring
DDoS Distributed Denial of Service
DLP Data Loss Prevention
DMZ Demilitarized Zone
DR Disaster Recovery
EF Exposure Factor
IETF Internet Engineering Task Force
ESP Encapsulating Security Payload
FIPS Federal Information Processing Standard
FQDN Fully Qualified Domain Name
HA High Availability
HAVAL Hash of Variable Length
HSM Hardware Security Module
ICMP Internet Control Message Protocol
IPS Intrusion Prevention System
ISAKMP Internet Security Association and Key Management Protocol
MitB Man in the Browser
MitM Man in the Middle
MTBF Mean Time Between Failures
MTR Mean Time to Restore
NAC Network Access Control
NAP Network Access Protection
NFS Network File Sharing
NIDS Network Intrusion Detection System
NIPS Network Intrusion Prevention System
NIST National Institute of Standards and Technology
NGF Next Generation Firewall
NSA National Security Agency
OWASP Open Web Application Security Project
PII Personally Identifiable Information
PPTP Point to Point Tunneling Protocol
RADIUS Remote Authentication Dial In User System
RAID Redundant Array of Independent Disks
RAS Remote Access Servers
RCP Remote Copy
RPO Recovery Point Objectives
RTO Recovery Time Objectives
SA Security Association
SANS System Administration Networking and Security Institute
SCP Secure Copy
SEM Security Event Managers
SIEM Security Information Event Managers
SIM Security Incident Manager
SLE Single Loss Expectancy
SMTP Simple Mail Transport Protocol
SPI Stateful Packet Inspection
SPIM Spam Over Instant Messaging
SSH Secure Shell
SSID Service Set Identifier
STP Spanning Tree Protocol
TFTP Trivial File Transfer Protocol
TLS Transport Layer Security
UCE Unsolicited Commercial Email
UPS Uninteruptable Power Supply
WAP Wireless Access Point
Created by: dj7levin