Lesson 8 Acronyms Flashcards

(35 cards)

1
Q

AI

A

Artificial Intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

API

A

Application Programming Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

CASB

A

Cloud Access Security Broker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

CTI

A

Cyber Threat Intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

CVE

A

Common Vulnerability and Exposures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

CVSS

A

Common Vulnerability Scoring System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

DOM

A

Document Object Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

EF

A

Exposure Factor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

EOL

A

End Of Life

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

ISACs

A

Information Sharing and Analysis Centers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

KRACK

A

Key Reinstallation Attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

OSINT

A

Open-Source Intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

PCI DSS

A

Payment Card Industry Data Security Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

SCA

A

Software Composition Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

SBOM

A

Software Bill of Materials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SCAP

A

Security content Automation Protocol

17
Q

SQL

A

Structured Query Language

18
Q

SQLi

A

SQL Injection

19
Q

TOCTOU

A

Time of Check to Time Of use

20
Q

TTPs

A

Tactics
Techniques
Procedures

21
Q

AES

A

Advanced Encryption Standard

22
Q

ASLR

A

Address Space Layout Randomization

23
Q

BEAST

A

Browser Exploit Against SSL/TLS

24
Q

CSRF

A

Cross-Site Request Forgery

25
DEP
Data Execution Prevention
26
DES
Data Encryption Standard
27
HSMs
Hardware Security modules
28
KMS
Key Management Systems
29
NVD
National Vulnerability
30
NVTs
Network Vulnerability Tests
31
OS
Operating System
32
OTX
Open Threat Exchange
33
POODLE
Padding Oracle On Downgraded Legacy Encryption
34
SPDX
Software Package Data Exchange
35
TOR
The Onion Router