Ack2 Flashcards

1
Q

CASB

A

Cloud Access Security Broker

enterprise management software designed to mediate access to cloud services by users across all types of devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

CBC

A

Cipher Block Chaining
ensures that no plaintext block produces the same ciphertext. CBC needs to use padding to ensure that the data to encrypt is an exact multiple of the block s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

CBT

A

Computer-based Training

lets a student acquire skills & experience by completing various activities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

CCMP

A

Counter-Mode/CBC-MAC Protocol
provides authenticated encryption, which is designed to make replay attacks harder

Cipher Block chaining encryption on the LAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

CERT

A

Computer Emergency Response Team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

CFB

A

Cipher Feedback

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

CHAP

A

Challenge-Handshake Authentication Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

CIO

A

Chief Info Officer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

CIRT

A

Computer Incident Response Team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

CIS

A

Center for Internet Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

CMS

A

Content Management System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

CN

A

Common Name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

COOP

A

Continuity of Operations Planning

refers to the same sorts of activities when undertaken by a government agency, rather than a business

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

COPE

A

Corporate-owned Personally Enabled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

CP

A

Contingency Planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

CRC

A

Cyclic Redundancy Check

a code added to data which is used to detect errors occurring during transmission, storage, or retrieval.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

CRL

A

Certificate Revocation List

lets you know about suspended or revoked keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

CSA

A

Cloud Security Alliance

Industry body providing security guidance to CSP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

CSIRT

A

Computer Security Incident Response Team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

CSO

A

Chief Security Officer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

CSP

A

Cloud Service Provider

22
Q

CSR

A

Certificate Signing Request
Base64 ASCII file that a subject sends to a CA to get a certificate
Use for online CA and make the root an offline CA (to make it secure)

23
Q

XSRF (CSRF)

A

Cross-Site Request Forgery
A malicious script hosted on the attacker’s site that can exploit a session started on another site in the same browser.

user unintentionally makes changes

24
Q

CSU

A

Channel Service Unit WAN (wide area network port: used to connect to an internet source) router performs loopback testing

25
CTM
Counter-Mode | An encryption mode of operation where a numerical counter value is used to create a constantly changing IV
26
CCMP
CCMP (counter mode with cipher block chaining message authentication code protocol) An encryption protocol used for wireless LANs that addresses the vulnerabilities of the WEP protocol
27
CTO
Chief Technology Officer
28
CYOD
Choose Your Own Device
29
DAC
Discretionary Access Control | Access control model where each resource is protected by an Access Control List (ACL) managed by the resource's owner
30
DDoS
Distributed Denial-of-Service | An attack that uses multiple compromised hosts (a botnet) to overwhelm a service with request or response traffic
31
DEP
Data Execution Prevention system-level memory protection feature, Windows OS (legacy) mark pages as non-executable helps prevent damage from viruses or malicious code exploits
32
NFC
Near-field Communication A standard for peer-to-peer (2-way) radio communications over very short (around 4") distances, facilitating contactless payment and similar technologies. Based on RFID
33
NFV
Network Function Virtualization | Provisioning virtual network appliances, such as switches, routers, and firewalls, via VMs and containers
34
NGFW
Next-Generation Firewall
35
NG-SWG
Next-Generation Secure Web Gateway
36
NIC
Network Interface Card | hardware component without which a computer cannot be connected over a network. It is a circuit board
37
NOC
Network Operations Center | monitor/manage network systems
38
NTFS
New Technology File System Stores time values in UTC format used internally Controls storage space on a drive (store/read info on computer that's not easily removed)
39
NTLM
New Technology LAN Manager | challenge-response authentication protocol created by Microsoft for use in its products
40
NTP
Network Time Protocol | Helps servers on a network & on the internet keep the correct time
41
OAUTH
Open Authentication Standard for federated identity management, allowing resource servers or consumer sites to work with user accounts created and managed on a separate identity provider (let users give website their info w/o a PW)
42
OCSP
Online Certificate Status Protocol | Allows clients to request the status of a digital certificate, to check whether it is revoked.
43
OID
Object Identifier used for attributes of digital certificates. onboarding The process of bringing in a new employee, contractor, or supplier
44
OSI
Open System Interconnection | The 7 layers used for networks
45
OSINT
Open-source Intelligence | operate threat intelligence services on an open-source basis, earning income from consultancy
46
OSPF
Open Shortest Path First | link-state routing protocol providing fast convergence and excellent scalability
47
OT
``` Operational Technology network is established between embedded systems devices and their controllers. i.e. valves, motors, gauges, sensors DDoS can be used ```
48
OTA
Over-The-Air | updates can be delivered wirelessly, either through a Wi-Fi network or the data connection
49
OTG
On-The-Go | Android USB ports, allow a port to be a host or a device
50
Port
A number used to uniquely identify a transaction over a network by specifying both the host, and the service