{ "@context": "https://schema.org", "@type": "Organization", "name": "Brainscape", "url": "https://www.brainscape.com/", "logo": "https://www.brainscape.com/pks/images/cms/public-views/shared/Brainscape-logo-c4e172b280b4616f7fda.svg", "sameAs": [ "https://www.facebook.com/Brainscape", "https://x.com/brainscape", "https://www.linkedin.com/company/brainscape", "https://www.instagram.com/brainscape/", "https://www.tiktok.com/@brainscapeu", "https://www.pinterest.com/brainscape/", "https://www.youtube.com/@BrainscapeNY" ], "contactPoint": { "@type": "ContactPoint", "telephone": "(929) 334-4005", "contactType": "customer service", "availableLanguage": ["English"] }, "founder": { "@type": "Person", "name": "Andrew Cohen" }, "description": "Brainscape’s spaced repetition system is proven to DOUBLE learning results! Find, make, and study flashcards online or in our mobile app. Serious learners only.", "address": { "@type": "PostalAddress", "streetAddress": "159 W 25th St, Ste 517", "addressLocality": "New York", "addressRegion": "NY", "postalCode": "10001", "addressCountry": "USA" } }

S Glossary Flashcards

(15 cards)

1
Q

Scripting Language

A

Language that is run from the source code. All conversion to operation codes executable by the CPU is handled when it is needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Security Policy

A

A high-level statement of the security objectives of an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Security Triad

A

3 Essential security properties:
Confidentiality
Integrity
Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

SHA

A

Used to generate a cryptographic hash

Secure Hash Algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

SIEM

A

Used to aggregate multiple sources of security-related data so that data can be correlated to generate actionable alerts

Secuirty Info and Event Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

shellcode

A

A fragment of executable code used to get an attacker access to a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

SMB

A

A protocol used for file sharing and system management in a Windows environment

Server Message Block

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Sniffing

A

Collecting network packets for decoding and analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SOA

A

A way of designing an application by breaking functions into separate, smaller services

Service Oriented Architecture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Social Engineering

A

Getting a user to perform an action or give up info they shouldn’t

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Spoofing

A

Pretending to be a system or user other than the one you are

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

SQL

A

Used to programmatically interact with relational databases

Structured Query Language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Star Network

A

A network topology in which all endpoints connect to a central device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Subnet Mask

A

A 4 - octet value indicating which part of an IP address is network and which is host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

SYN Scan

A

A port scanning technique targeting TCP ports by sending a SYN request

How well did you know this?
1
Not at all
2
3
4
5
Perfectly