S Glossary Flashcards

(15 cards)

1
Q

Scripting Language

A

Language that is run from the source code. All conversion to operation codes executable by the CPU is handled when it is needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Security Policy

A

A high-level statement of the security objectives of an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Security Triad

A

3 Essential security properties:
Confidentiality
Integrity
Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

SHA

A

Used to generate a cryptographic hash

Secure Hash Algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

SIEM

A

Used to aggregate multiple sources of security-related data so that data can be correlated to generate actionable alerts

Secuirty Info and Event Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

shellcode

A

A fragment of executable code used to get an attacker access to a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

SMB

A

A protocol used for file sharing and system management in a Windows environment

Server Message Block

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Sniffing

A

Collecting network packets for decoding and analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SOA

A

A way of designing an application by breaking functions into separate, smaller services

Service Oriented Architecture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Social Engineering

A

Getting a user to perform an action or give up info they shouldn’t

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Spoofing

A

Pretending to be a system or user other than the one you are

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

SQL

A

Used to programmatically interact with relational databases

Structured Query Language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Star Network

A

A network topology in which all endpoints connect to a central device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Subnet Mask

A

A 4 - octet value indicating which part of an IP address is network and which is host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

SYN Scan

A

A port scanning technique targeting TCP ports by sending a SYN request

How well did you know this?
1
Not at all
2
3
4
5
Perfectly