sec Flashcards

(321 cards)

1
Q

DAC

A

Discretionary Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

RBAC

A

Rule-based Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

SOAR

A

Security Orchestration Automation Response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

GCM

A

Galois Counter Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

OSINT

A

Open-source Intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

SQLi

A

SQL Injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

TOU

A

Time-of-use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

ML

A

Machine Learning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

RSA

A

Rivest Shamir & Adleman

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

UAT

A

User Acceptance Testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

HDD

A

Hard Disk Drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

SoC

A

System on Chip

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

XSS

A

Cross-site Scripting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

ASLR

A

Address Space Layout Randomization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ISP

A

Internet Service Provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

NTFS

A

New Technology File System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

UAV

A

Unmanned Aerial Vehicle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

AP

A

Access Point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

CIA

A

Confidentiality Integrity Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

DPO

A

Data Privacy Officer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

ISSO

A

Information Systems Security Officer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

NDA

A

Non-disclosure Agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

ROI

A

Return on Investment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

TOTP

A

Time-based One-time Password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
EDR
Endpoint Detection and Response
26
CRL
Certificate Revocation List
27
FRR
False Rejection Rate
28
MTTF
Mean Time to Failure
29
CTO
Chief Technology Officer
30
MTTR
Mean Time to Recover
31
MTU
Maximum Transmission Unit
32
SLA
Service-level Agreement
33
WTLS
Wireless TLS
34
CASB
Cloud Access Security Broker
35
GDPR
General Data Protection Regulation
36
S/MIME
Secure/Multipurpose Internet Mail Extensions
37
TPM
Trusted Platform Module
38
VLAN
Virtual Local Area Network
39
BCP
Business Continuity Planning
40
GRE
Generic Routing Encapsulation
41
CCMP
Counter Mode/CBC-MAC Protocol
42
HMAC
Hashed Message Authentication Code
43
ICS
Industrial Control Systems
44
IM
Instant Messaging
45
SNMP
Simple Network Management Protocol
46
FIM
File Integrity Management
47
SE
Linux Security-enhanced Linux
48
SED
Self-encrypting Drives
49
ACL
Access Control List
50
PFS
Perfect Forward Secrecy
51
AAA
Authentication Authorization and Accounting
52
P12
PKCS #12
53
SQL
Structured Query Language
54
STIX
Structured Threat Information eXchange
55
WPS
Wi-Fi Protected Setup
56
CA
Certificate Authority
57
CFB
Cipher Feedback
58
NTP
Network Time Protocol
59
SPF
Sender Policy Framework
60
DEP
Data Execution Prevention
61
MOU
Memorandum of Understanding
62
TSIG
Transaction Signature
63
LEAP
Lightweight Extensible Authentication Protocol
64
SDN
Software-defined Networking
65
OAUTH
Open Authorization
66
WO
Work Order
67
WAF
Web Application Firewall
68
AV
Antivirus
69
COOP
Continuity of Operation Planning
70
ECDSA
Elliptic Curve Digital Signature Algorithm
71
LAN
Local Area Network
72
OVAL
Open Vulnerability Assessment Language
73
RTP
Real-time Transport Protocol
74
SMTP
Simple Mail Transfer Protocol
75
DDoS
Distributed Denial of Service
76
IMAP
Internet Message Access Protocol
77
MOA
Memorandum of Agreement
78
PAP
Password Authentication Protocol
79
GPS
Global Positioning System
80
ICMP
Internet Control Message Protocol
81
SHA
Secure Hashing Algorithm
82
IDF
Intermediate Distribution Frame
83
SWG
Secure Web Gateway
84
CRC
Cyclical Redundancy Check
85
SSH
Secure Shell
86
CMS
Content Management System
87
CYOD
Choose Your Own Device
88
OT
Operational Technology
89
RACE
Research and Development in Advanced Communications Technologies in Europe
90
SASE
Secure Access Service Edge
91
CCTV
Closed-circuit Television
92
DoS
Denial of Service
93
RDP
Remote Desktop Protocol
94
API
Application Programming Interface
95
NAT
Network Address Translation
96
PED
Personal Electronic Device
97
RAD
Rapid Application Development
98
DBA
Database Administrator
99
DLL
Dynamic Link Library
100
DSA
Digital Signature Algorithm
101
MSA
Master Service Agreement
102
Authentication
Protocol
103
XDR
Extended Detection and Response
104
XSRF
Cross-site Request Forgery
105
AUP
Acceptable Use Policy
106
PaaS
Platform as a Service
107
URI
Uniform Resource Identifier
108
VDE
Virtual Desktop Environment
109
BYOD
Bring Your Own Device
110
TAXII
Trusted Automated eXchange of Indicator Information
111
DHCP
Dynamic Host Configuration Protocol
112
DRP
Disaster Recovery Plan
113
HTTP
Hypertext Transfer Protocol
114
SHTTP
Secure Hypertext Transfer Protocol
115
NIPS
Network-based Intrusion Prevention System
116
NTLM
New Technology LAN Manager
117
ARP
Address Resolution Protocol
118
BIOS
Basic Input/Output System
119
MAN
Metropolitan Area Network
120
UEM
Unified Endpoint Management
121
CHAP
Challenge Handshake Authentication Protocol
122
MD5
Message Digest 5
123
PTZ
Pan-tilt-zoom
124
SAE
Simultaneous Authentication of Equals
125
SEH
Structured Exception Handler
126
OSPF
Open Shortest Path First
127
IAM
Identity and Access Management
128
SDLC
Software Development Lifecycle
129
VBA
Visual Basic
130
WIPS
Wireless Intrusion Prevention System
131
ARO
Annualized Rate of Occurrence
132
CSP
Cloud Service Provider
133
ISO
International Standards Organization
134
PCI
DSS Payment Card Industry Data Security Standard
135
SSO
Single Sign-on
136
VPC
Virtual Private Cloud
137
MFD
Multifunction Device
138
UEFI
Unified Extensible Firmware Interface
139
IRC
Internet Relay Chat
140
OID
Object Identifier
141
CVE
Common Vulnerability Enumeration
142
HOTP
HMAC-based One-time Password
143
PAM
Pluggable Authentication Modules
144
SMS
Short Message Service
145
FDE
Full Disk Encryption
146
IPSec
Internet Protocol Security
147
RTBH
Remotely Triggered Black Hole
148
SMTPS
Simple Mail Transfer Protocol Secure
149
WIDS
Wireless Intrusion Detection System
150
BASH
Bourne Again Shell
151
ERP
Enterprise Resource Planning
152
IoC
Indicators of Compromise
153
PPP
Point-to-Point Protocol
154
PUP
Potentially Unwanted Program
155
TACACS+
Terminal Access Controller Access Control System
156
WPA
Wi-Fi Protected Access
157
AI
Artificial Intelligence
158
URL
Universal Resource Locator
159
DSL
Digital Subscriber Line
160
SCEP
Simple Certificate Enrollment Protocol
161
TCP/IP
Transmission Control Protocol/Internet Protocol
162
TGT
Ticket Granting Ticket
163
ESN
Electronic Serial Number
164
MTBF
Mean Time Between Failures
165
OTA
Over the Air
166
TKIP
Temporal Key Integrity Protocol
167
BIA
Business Impact Analysis
168
CAR
Corrective Action Report
169
IEEE
Institute of Electrical and Electronics Engineers
170
PAT
Port Address Translation
171
POP
Post Office Protocol
172
BPA
Business Partners Agreement
173
COPE
Corporate Owned Personally Enabled
174
VLSM
Variable Length Subnet Masking
175
WAP
Wireless Access Point
176
DES
Digital Encryption Standard
177
MPLS
Multi-protocol Label Switching
178
PEAP
Protected Extensible Authentication Protocol
179
VPN
Virtual Private Network
180
XML
Extensible Markup Language
181
ESP
Encapsulated Security Payload
182
GPU
Graphics Processing Unit
183
CSR
Certificate Signing Request
184
IaaS
Infrastructure as a Service
185
IdP
Identity Provider
186
NFC
Near Field Communication
187
NIST
National Institute of Standards & Technology
188
RA
Registration Authority
189
IRP
Incident Response Plan
190
RADIUS
Remote Authentication Dial-in User Service
191
AH
Authentication Header
192
MBR
Master Boot Record
193
CP
Contingency Planning
194
RC4
Rivest Cipher version 4
195
TOC
Time-of-check
196
VM
Virtual Machine
197
DNAT
Destination Network Address Translation
198
PEM
Privacy Enhanced Mail
199
CBC
Cipher Block Chaining
200
ECB
Electronic Code Book
201
HIPS
Host-based Intrusion Prevention System
202
MDF
Main Distribution Frame
203
PBX
Private Branch Exchange
204
DKIM
DomainKeys Identified Mail
205
PII
Personally Identifiable Information
206
PKI
Public Key Infrastructure
207
RAT
Remote Access Trojan
208
BPDU
Bridge Protocol Data Unit
209
CSU
Channel Service Unit
210
HSM
Hardware Security Module
211
IR
Incident Response
212
XOR
Exclusive Or
213
DLP
Data Loss Prevention
214
SOC
Security Operations Center
215
SPIM
Spam over Internet Messaging
216
AES-256
Advanced Encryption Standards 256-bit
217
OCSP
Online Certificate Status Protocol
218
SSD
Solid State Drive
219
UPS
Uninterruptable Power Supply
220
APT
Advanced Persistent Threat
221
DMARC
Domain Message Authentication Reporting and Conformance
222
NIDS
Network-based Intrusion Detection System
223
PHI
Personal Health Information
224
POTS
Plain Old Telephone Service
225
EAP
Extensible Authentication Protocol
226
IDEA
International Data Encryption Algorithm
227
MSSP
Managed Security Service Provider
228
IV
Initialization Vector
229
SaaS
Software as a Service
230
SOAP
Simple Object Access Protocol
231
VoIP
Voice over IP
232
SAML
Security Assertions Markup Language
233
SLE
Single Loss Expectancy
234
WEP
Wired Equivalent Privacy
235
GPO
Group Policy Object
236
CIRT
Computer Incident Response Team
237
CTM
Counter Mode
238
GPG
Gnu Privacy Guard
239
HA
High Availability
240
PKCS
Public Key Cryptography Standards
241
SD-WAN
Software-defined Wide Area Network
242
FTP
File Transfer Protocol
243
HIDS
Host-based Intrusion Detection System
244
HTTPS
Hypertext Transfer Protocol Secure
245
UTM
Unified Threat Management
246
IaC
Infrastructure as Code
247
LDAP
Lightweight Directory Access Protocol
248
SDLM
Software Development Lifecycle Methodology
249
SOW
Statement of Work
250
AIS
Automated Indicator Sharing
251
ATT&CK
Adversarial Tactics Techniques and Common Knowledge
252
L2TP
Layer 2 Tunneling Protocol
253
MAC
Message Authentication Code
254
MFA
Multifactor Authentication
255
NAC
Network Access Control
256
PDU
Power Distribution Unit
257
SFTP
Secured File Transfer Protocol
258
RAS
Remote Access Server
259
SIEM
Security Information and Event Management
260
CSO
Chief Security Officer
261
DNS
Domain Name System
262
MMS
Multimedia Message Service
263
CERT
Computer Emergency Response Team
264
UDP
User Datagram Protocol
265
CSRF
Cross-site Request Forgery
266
ECC
Elliptic Curve Cryptography
267
IKE
Internet Key Exchange
268
MDM
Mobile Device Management
269
RTO
Recovery Time Objective
270
SCAP
Security Content Automation Protocol
271
P2P
Peer to Peer
272
PPTP
Point-to-Point Tunneling Protocol
273
RAID
Redundant Array of Inexpensive Disks
274
SIM
Subscriber Identity Module
275
CAPTCHA
Completely Automated Public Turing Test to Tell Computers and Humans Apart
276
SDK
Software Development Kit
277
ECDHE
Elliptic Curve Diffie-Hellman Ephemeral
278
TTP
Tactics Techniques and Procedures
279
EFS
Encrypted File System
280
RTOS
Real-time Operating System
281
CVSS
Common Vulnerability Scoring System
282
PAC
Proxy Auto Configuration
283
VDI
Virtual Desktop Infrastructure
284
HVAC
Heating Ventilation Air Conditioning
285
KDC
Key Distribution Center
286
SCADA
Supervisory Control and Data Acquisition
287
ALE
Annualized Loss Expectancy
288
HTML
Hypertext Markup Language
289
MFP
Multifunction Printer
290
NGFW
Next-generation Firewall
291
RFID
Radio Frequency Identifier
292
SRTP
Secure Real-Time Protocol
293
DHE
Diffie-Hellman Ephemeral
294
IoT
Internet of Things
295
PSK
Pre-shared Key
296
SSL
Secure Sockets Layer
297
TLS
Transport Layer Security
298
IPS
Intrusion Prevention System
299
MSCHAP
Microsoft Challenge Handshake
300
RIPEMD
RACE Integrity Primitives Evaluation Message Digest
301
RPO
Recovery Point Objective
302
OS
Operating System
303
PCAP
Packet Capture
304
USB
OTG USB On the Go
305
CIO
Chief Information Officer
306
FACL
File System Access Control List
307
FPGA
Field Programmable Gate Array
308
IDS
Intrusion Detection System
309
KEK
Key Encryption Key
310
PBKDF2
Password-based Key Derivation Function 2
311
PGP
Pretty Good Privacy
312
PIV
Personal Identity Verification
313
AES
Advanced Encryption Standard
314
BGP
Border Gateway Protocol
315
IP
Internet Protocol
316
MaaS
Monitoring as a Service
317
MSP
Managed Service Provider
318
SAN
Subject Alternative Name
319
UTP
Unshielded Twisted Pair
320
FTPS
Secured File Transfer Protocol
321
VTC
Video Teleconferencing