Acronyms Flashcards

(61 cards)

1
Q

DDoS

A

Distributed Denial of Service (Chapter 7)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

NOP

A

No Operation (Chapter 7)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

XSS

A

Cross Site Scripting (Chapter 7)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

XSRF

A

Cross Site Request Forgery (Chapter 7)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

SHA

A

Secure Hash Algorithm (Chapter 10)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

AES

A

Advanced Encryption Standard (Chapter 10)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

DES

A

Data Encryption Standard (Chapter 10)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

RC4

A

Rivest Cipher 4 (Chapter 10)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

MD5

A

Message Digest 5 (Chapter 10)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

HMAC

A

Hash-Based Message Authentication Code (Chapter 10)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

PGP

A

Pretty Good Privacy (Chapter 10)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ECC

A

Elliptic Curve Cryptography (Chapter 10)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

RSA

A

Rivest, Shamir & Adleman (Chapter 10)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

RTO

A

Recovery Time Objective (Chapter 9)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

RPO

A

Recovery Point Objective (Chapter 9)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

MTBF

A

Mean Time Between Failures (Chapter 9)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

MTTR

A

Mean Time To Recover (Chapter 9)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

ALE

A

Annual Loss Expectancy (Chapter 8)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

SLE

A

Single Loss Expectancy (Chapter 8)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

ARO

A

Annual Rate of Occurrence (Chapter 8)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

PAT

A

Port Address Translation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

NAT

A

Network Address Translation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

ISP

A

Internet Service Provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

LAN

A

Local Area Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
CISO
Chief Information Security Officer
26
HIDS
Host Based Intrusion Detection System
27
NIPS
Network Based Intrusion Prevention System
28
IDS
Intrusion Detection System
29
CTO
Chief Technical Officer
30
FQDN
Fully Qualified Domain Name
31
UTM
Unified Threat Management
32
WAF
Web Application Firewall
33
NGFW
Next Generation Firewall
34
XML
Extensible Markup Language (Chapter 7)
35
LDAP
Lightweight Directory Application Protocol (Chapter 7)
36
CIA
Confidentiality, Integrity, Availability
37
WPA2
Wi-Fi Protected Access 2 (Chapter 5)
38
TPM
Trusted Platform Module (Chapter 5)
39
VSAN
Virtual Storage Area Network (Chapter 5)
40
EFS
Encrypting File System (Chapter 5)
41
HSM
Hardware Security Module (Chapter 5)
42
DLP
Data Loss Prevention (Chapter 5)
43
IaaS
Infrastructure as a Service (Chapter 5)
44
SaaS
Software as a Service
45
NAC
Network Access Control (Chapter 4)
46
CVE
Common Vulnerabilities and Exposures (Chapter 4)
47
TKIP
Temporal Key Integrity Protocol (Chapter 4)
48
SSID
Service Set Identifier (Chapter 4)
49
CCMP
Counter Mode Cipher Block Chaining Message Authentication Code Protocol (Chapter 4)
50
PPTP
Point to Point Tunneling Protocol
51
SFTP
Secure File Transfer Protocol
52
NFC
Near Field Communication (Chapter 4)
53
SCP
Secure Copy
54
SQL
Structured Query Language
55
LSO
Locally Shared Objects
56
IV
Initialization Vector
57
RFID
Radio Frequency Identification
58
MaaS
Monitoring as a Service
59
BCP
Business Continuity Plan
60
ECDHE
Elliptic Curve Diffie-Hellman Ephemeral
61
PBKDF2
Password-Based Key Derivation Function 2