6.5 Flash Cards -Domain 5 - Security Operations

Application Server

Pasted image 20240402133517.png

Asymmetric Encryption

Pasted image 20240402133954.png

Checksum

Pasted image 20240402134129.png

Ciphertext

Pasted image 20240402134208.png

Classification

Pasted image 20240402134230.png

Configuration management

Pasted image 20240402134258.png

Cryptanalyst

Pasted image 20240402134731.png

Cryptography

Pasted image 20240402134812.png

Data Loss Prevention (DLP)

Pasted image 20240402135008.png

Decryption

Pasted image 20240402135029.png

Degaussing

Pasted image 20240402135059.png

Digital Signature

Pasted image 20240402135119.png

Egress Monitoring

Pasted image 20240402135148.png

Encryption

Pasted image 20240402135212.png

Encryption System

Pasted image 20240402135234.png

Hardening

Pasted image 20240402135310.png

Hash Function

Pasted image 20240402135338.png

Hashing

Pasted image 20240402135358.png

Information Sharing

Pasted image 20240402135422.png

Ingress Monitoring

Pasted image 20240402135446.png

Message Digest

Pasted image 20240402135505.png

Operating System

Pasted image 20240402135528.png

Patch

Pasted image 20240402135550.png

Patch Management

Pasted image 20240402135609.png

Plaintext

Pasted image 20240402135632.png

Records

Pasted image 20240402135648.png

Records Retention

Pasted image 20240402135830.png

Remanence

Pasted image 20240402140028.png

Request for change (RFC)

Pasted image 20240402140138.png

Security Governance

Pasted image 20240402140201.png

Social Engineering

Pasted image 20240402140356.png

Symmetric Encryption

Pasted image 20240402140418.png

Web Server

Pasted image 20240402140441.png

Whaling Attack

Pasted image 20240402140512.png