Acronyms Flashcards

1
Q

3DES

A

Triple Data Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

AAA

A

Authentication, Authorization, and Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ABAC

A

Attribute Based Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ACL

A

Access Control List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

AD

A

Active Directory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

AES / AES256

A

Advanced Encryption Standard / 256 bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

AH

A

Authentication Header; supports authentication and integrity only.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

AI

A

Artificial Intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

AIS

A

Automated Indicator Sharing -
enables organizations to share and receive machine-readable cyber threat indicators (CTIs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

ALE

A

Annualized Loss Expectancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

AP

A

Access Point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

API

A

Application Programming Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

APT

A

Advanced Persistent Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

ARO

A

Annualized Rate of Occurence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ARP

A

Address Resolution Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

ASLR

A

Address Space Layout Randomization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

ASP

A

Active Server Pages - is Microsoft’s first server-side scripting language and engine for dynamic web pages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

ATT&K

A

Adversarial Tactics and Techniques

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

AUP

A

Acceptable Use Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

AV

A

Antivirus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

BASH

A

Bourne Again Shell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

BCP

A

Business Continuity Planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

BGP

A

Border Gateway Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

BIA

A

Business Impact Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

BIOS

A

Basic Input Output System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

BPA

A

Business Partnership Agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

BPDU

A

Bridge Protocol Data Unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

BSSID

A

Basic Service Set Identifier

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

BYOD

A

Bring Your Own Device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

CA

A

Certificate Authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

CAPTCHA

A

Completely Automated Public Turing - test to tell humans and computers apart

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

CAR

A

Corrective Action Report

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

CASB

A

Cloud Access Security Broker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

CBC

A

Cipher Block Chaining

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

CBT

A

Computer Based Training

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

CCMP

A

Counter-mode CBC-MAC Protocol - an enhanced data cryptographic encapsulation mechanism designed for data confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

CCTV

A

Closed Circuit Television

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

CERT

A

Computer Emergency Response Team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

CFB

A

Cipher Feedback

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

CHAP

A

Challenge Handshake Authentication Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

CIO

A

Chief Information Officer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

CIRT

A

Computer Incident Response Team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

CIS

A

Center for Internet Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

CMS

A

Content Management System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

CN

A

Common Name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

COPE

A

Corporate Owned, Personally Enabled

47
Q

CP

A

Contingency Planning

48
Q

CRC

A

Cyclic Redundancy Check

49
Q

CRL

A

Certificate Revocation List

50
Q

CSA- (not certif sign authority)

A

Cloud Security Alliance

51
Q

CSIRT

A

Computer Security Incident response Team

52
Q

CSO

A

Chief Security Officer

53
Q

CSR

A

Certificate Signing Request

54
Q

CSRF/xsrf

A

Cross-Site Request Forgery
1: Exploits the trust a website has in the user’s web browser, 2: User submits an unauthorized request to the server, and 3: The website executes the attacker’s request

55
Q

CSU

A

Channel Service Unit

56
Q

CTM

A

Counter-Mode

57
Q

CTO

A

Chief Technology Officer

58
Q

CVE

A

Common Vulnerabilities and Exposures - open source list (database) of computer security flaws.

59
Q

CVSS

A

Common Vulnerability Scoring System: 0 to 10, with 10 being the most severe.

60
Q

CYOD

A

Choose Your Own Device

61
Q

DAC

A

Discretionary Access Control

62
Q

DBA

A

Database Administrator

63
Q

DDoS

A

Distributed Denial of Service

64
Q

DEP

A

Data Execution Prevention: Microsoft technology that prevent buffer overflow attacks and executable code from launching; systems level memory protection

65
Q

DER

A

Distinguished Encoding Rules -encoding for x.509 certificates and private keys; .der and .cer file extensions.

66
Q

DES, not digital

A

Data Encryption Standard

67
Q

DHCP

A

Dynamic Host Configuration Protocol

68
Q

DHE

A

Diffie-Hellman Ephemeral

69
Q

DKIM

A

Domain Keys Identified Mail

70
Q

DLL

A

Dynamic Link Library

71
Q

DLP

A

Data Loss Prevention

72
Q

DMARC

A

Domain Message Authentication Reporting and Conformance - DNS text record

73
Q

DNAT

A

Destination Network Address Transaction

74
Q

DNS

A

Domain Name System

75
Q

DNSSEC

A

Domain Name System Security Extensions

76
Q

DoS

A

Denial of Service

77
Q

DPO

A

Data Protection Officer

78
Q

DRP

A

Disaster Recovery Plan

79
Q

DSA

A

Digital Signature Algorithm

80
Q

DSL

A

Digital Subscriber Line

81
Q

EAP

A

Extensible Authentication Protocol

82
Q

ECB

A

Electronic Code Book

83
Q

ECC

A

Elliptic-Curve Cryptography

84
Q

ECDHE

A

Elliptic-Curve Diffie Hellman Ephemeral

85
Q

ECDSA

A

Elliptic Curve Digital Signature Algorithm

86
Q

EDR

A

Endpoint Detection and Response

87
Q

EFS

A

Encrypted File System

88
Q

EIP

A

Extended Instruction Pointer -tells the computer where to go next to execute the next command and controls the flow of a program.

89
Q

EOL

A

End of Life

90
Q

EOS

A

End of Service

91
Q

ERP

A

Enterprise Resource Planning

92
Q

ESN

A

Electronic Serial Number

93
Q

ESP

A

Encapsulating Security Payload; supports CIA, Confidentiality, Integrity, and authentication

94
Q

ESSID

A

Extended Service-Set Identifier

95
Q

FACL

A

File system Access Control List

96
Q

FDE

A

Full Disk Encryption

97
Q

FIM

A

File Integrity Monitoring

98
Q

FPGA

A

Field Programmable Gate Array- A processor that can be programmed for a specific function by the customer, not manufacturer.

99
Q

FRR

A

False Rejection Rate

100
Q

FTP

A

File Transfer Protocol

101
Q

CAC

A

Common Access Card

102
Q

CA

A

Certificate Authority

103
Q

CER

A

Crossover Error Rate

104
Q

COOP

A

Continuity of Operations Plan

105
Q

CSP

A

Cloud Service Provider

106
Q

DFIR

A

Digital Forensics and Investigation Report

107
Q
A
108
Q

BCRYPT

A
109
Q

EAP-FAST

A

Extensible Authentication Protocol - Flexible Authentication via Secure Tunneling: wireless authentication protocol using a tls tunnel

110
Q

FAR

A

False Acceptance Rate

111
Q

CER

A

Crossover Error Rate: The rate where the biometric FAR and FRR are equal.

112
Q

FAT

A

File Allocation Table: time stamps are local to the device.

113
Q

CSF

A

Cybersecurity Framework :nist guidlines, standards, and framework to improve posture