SEC 1-5 Flashcards

Memorize most if not everything (49 cards)

1
Q

What does ACL stand for or represent?

A

Access Control List – defines who can access specific files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does IDS stand for or represent?

A

Intrusion Detection System – monitors network traffic for suspicious activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does IPS stand for or represent?

A

Intrusion Prevention System – blocks threats based on detection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does VPN stand for or represent?

A

Virtual Private Network – encrypts traffic for secure communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does MFA stand for or represent?

A

Multi-Factor Authentication – requires multiple forms of identity verification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does DAC stand for or represent?

A

Discretionary Access Control – access is set by the owner of the resource.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does MAC stand for or represent?

A

Mandatory Access Control – access is governed by policy or classification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does SIEM stand for or represent?

A

Security Information and Event Management – centralized log management and alerting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does SQLi stand for or represent?

A

Structured Query Language Injection – injecting SQL code to manipulate a database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does XSS stand for or represent?

A

Cross-Site Scripting – injecting scripts into a web page.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does EOL stand for or represent?

A

End Of Life – software or hardware no longer supported.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does APT stand for or represent?

A

Advanced Persistent Threat – a stealthy long-term attack, often by nation states.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does TOCTOU stand for or represent?

A

Time Of Check to Time Of Use – a race condition vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does API stand for or represent?

A

Application Programming Interface – allows software to communicate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does TLS stand for or represent?

A

Transport Layer Security – protocol for encrypting data in transit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does SSL stand for or represent?

A

Secure Sockets Layer – outdated encryption protocol replaced by TLS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What does OS stand for or represent?

A

Operating System – system software managing hardware and software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What does VM stand for or represent?

A

Virtual Machine – emulated system running inside another OS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What does GAP Analysis stand for or represent?

A

Comparison of current state with desired goals to identify gaps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What does UPS stand for or represent?

A

Uninterruptible Power Supply – provides backup power during outages.

21
Q

What does IM stand for or represent?

A

Instant Messaging – real-time text communication.

22
Q

What does SMS stand for or represent?

A

Short Message Service – text messaging protocol.

23
Q

What does DDoS stand for or represent?

A

Distributed Denial of Service – attack using many systems to overwhelm a target.

24
Q

What does DES stand for or represent?

A

Data Encryption Standard – outdated encryption algorithm.

25
What does SC stand for or represent?
Secure Communications – protocols like SSL/TLS that encrypt communication.
26
What does PEP stand for or represent?
Policy Enforcement Point – manages network access requests.
27
What does DLL stand for or represent?
Dynamic-Link Library – Windows file used for shared functions.
28
What does RAM stand for or represent?
Random Access Memory – temporary, high-speed data storage.
29
What does DAD stand for or represent?
Disclosure, Alteration, Denial – opposite of CIA triad.
30
What are the three main goals of cybersecurity (CIA Triad)?
Confidentiality, Integrity, Availability
31
What does Confidentiality mean in cybersecurity?
Ensuring only authorized individuals can access sensitive data.
32
What are examples of Confidentiality mechanisms?
Encryption, Firewalls, ACLs, MFA, Access Controls
33
What is Integrity in cybersecurity?
Protecting data from unauthorized alteration to maintain accuracy and trust.
34
What is Availability in cybersecurity?
Ensuring systems and data are accessible when needed by authorized users.
35
What is Zero Trust?
A model where no user or system is trusted by default, even inside the network.
36
What is the purpose of Authentication?
Verifying the identity of a user or system.
37
What is Authorization?
Determining what a user/system is allowed to access.
38
What is Accounting?
Tracking user activity within a system for auditing.
39
What is a Threat Actor?
An individual or group posing a threat to a system (e.g., hacker, insider, nation-state).
40
What is a Vulnerability?
A weakness in a system that can be exploited.
41
What is a Race Condition?
When the timing of events can be exploited to cause unexpected behavior.
42
What is Buffer Overflow?
Overflowing a memory buffer to overwrite adjacent memory and possibly execute code.
43
What is SQL Injection?
Manipulating database queries by injecting SQL into input fields.
44
What is Cross-Site Scripting (XSS)?
Injecting scripts into web pages to manipulate or steal data.
45
What is a Zero-Day Vulnerability?
A newly discovered vulnerability that has no available fix or patch.
46
What are Preventive Controls?
Controls that attempt to stop incidents before they happen (e.g. firewall, access control).
47
What are Detective Controls?
Controls that identify and log incidents (e.g. IDS, audit logs).
48
What are Corrective Controls?
Controls that remediate incidents (e.g. backups, patching).
49
What is Layered Security?
Using multiple security measures to protect systems in depth.