SEC+ Acronyms Flashcards

Learn Acronyms (78 cards)

1
Q

FIM

A

File Integrity Monitoring [detects if files have been altered]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

NAC

A

Network Access Control [used to control access based on users and their devices]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

SPF

A

Sender Policy Framework [used to prevent email spoofing and phishing attacks]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

MFA

A

Multi-Factor Authentication [used to protects accounts in case another factor is compromised]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Logic Bomb

A

[code inserted into app or script set to execute in response to an event]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

RAT

A

Remote Access Trojan [malware that lets an attacker access a system remotely]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Evil Twin Attack

A

targets Wi-Fi networks by mimicking an existing network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Rootkit

A

Malware that gives a user administrative access to a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

DMZ

A

Demilitarized Zone [a screen subnet on a network that contains systems accessible by clients or other networks on the Internet]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

LAN

A

Local Area Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

VPN

A

Virtual Private Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Honeynets

A

Networks meant to distract attackers from legitimate networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Waterfall

A

methodology that includes multiple states, all of which feed into each other

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Scrum

A

a daily meeting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ESP

A

Encapsulating Security Payload [used to provide encryption of data and provide confidentiality]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

AH

A

Authentication Header [allows each of the hosts in the IPSec to authenticate with each other before exchanging data]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

IPS

A

Intrusion Prevention System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Static Code Analysis

A

testing method in which the app is not run but rather checked line by line.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Fuzz Testing

A

random characters are input into a computer program to find vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Dynamic Code Analysis

A

testing program while they’re running

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

AAA

A

Authentication, Authorization and Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

WPA3

A

used to encrypt Wi-Fi traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

WEP

A

outdated encryption method for Wi-Fi

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

RADIUS

A

protocol for authentication, authorization and accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
EAP-TLS
Extensible Authentication Protocol-Transport Layer Security [widely used authentication protocol in Wi-Fi networks]
26
Risk Transfer
transferring risk (entirely or partially) to another entity
27
Risk Mitigation
applying controls for a risk
28
Risk Acceptance
not taking any additional actions to mitigate a risk
29
MTTR
Mean Time To Repair [the time needed to repair a failed device]
30
MTTF
Mean Time To Failure [measure of reliability for devices that can't be repaired]
31
ARO
Annual Rate of Occurrence [number of times an incident occurs within a year]
32
ALE
Annual Loss Expectancy [total loss in dollars expected due to a specific incident]
33
MOA
Memorandum of Agreement [agreement between multiple entities that outlines in detail the roles and responsibilities of the parties]
34
SLA
Service Level Agreement [outlines expectations of a vendor to a client]
35
BPA
Business Partner Agreement [outlines obligations between business partners]
36
MOU
Memorandum of Understanding [understanding between two or more parties that states their intention to work toward a specific goal]
37
ISA
Interconnection Security Agreement [specifies security requirements for a connection between multiple entities]
38
PaaS
Platform as a Service [cloud computing platform for developing applications]
39
LDAP
Lightweight Directory Access Protocol [used for accessing and altering directory services data at the application layer]
40
FDE
Full Device Encryption
41
AUP
Acceptable Use Policy [outlines the rules and behaviors expected of those using company systems or networks]
42
NDA
Non-Disclosure Agreement [states an individual will not share confidential and proprietary data but doesn't outline how they should behave while using company systems]
43
BYOD
Bring Your Own Device [policy that outlines how to manage and protect personal devices before the connect to the corporate network]
44
CYOD
Choose Your Own Device [doesn't allow users to use their own personal devices on the network]
45
COPE
Corporate-Owned Personally Enabled [doesn't allow personal devices on corporate network]
46
CER
Crossover Error Rate [biometrics rate calculated by plotting FAR {False Acceptance Rate} and FRR {False Rejection Rate}]
47
FAR
False Acceptance Rate [a higher FAR mean more unauthorized users are granted access]
48
FRR
False Rejection Rate [means authorized users are not granted access]
49
SHA
Secure Hash Algorithm [a hashing function used to verify data integrity]
50
DH
Diffie-Hellman [a key exchange used for establishing a shared key]
51
DES
Data Encryption Standard [encryption algorithm]
52
AES
Advanced Encryption Standard [encryption algorithm]
53
SSO
Single Sign-On [allow user to log into multiple systems after a single successful login]
54
FTP
File Transfer Protocol [used to transfer files over a network]
55
HMAC
Hash-Based Message Authentication [a hashing algorithm]
56
MD5
Message Digest 5 [hashing algorithm]
57
RIPEMD
RACE Integrity Primitives Evaluation Message Digest [hashing algorithm]
58
SHA
Secure Hash Algorithm [a hashing algorithm]
59
TPM
Trusted Platform Module [a hardware chip attached to a computer's motherboard capable of storing keys for full disk encryption {FDE}]
60
FDE
Full Disk Encryption
61
MFD
Multi-Functional Device [a printer that also performs actions such as scanning, copying and faxing]
62
SED
Self-Encrypting Drive [automatically encrypts data]
63
DLP
Data Loss Prevention [used to actively identify and stop data exfiltration]
64
OCSP
Online Certificate Status Protocol [gives real-time info on the status of a certificate]
65
DAC
Discretionary Access Control [access control method where the owner of a file determines who can access]
66
MAC
Mandatory Access Control [uses classification levels on resources and clearance levels on uses]
67
RBAC
Role-Based Access Control [grants access based on a user's defined role]
68
ABAC
Attribute-Based Access Control [uses granular control based on attributes of users]
69
DoS
Denial-of-Service [overloading an app or service on a system, which leads to resource exhaustion]
70
IaaS
Infrastructure as a Service [provider give the customer computing resources such as servers, storage and networking]
71
SaaS
Software as a Service [offers a full application to the customer]
72
PaaS
Platform as a Service [offers an environment for developers to create application in the cloud]
73
BaaS
Backup as a Service [offers solutions for backing up and restoring data]
74
OSINT
Open-Source Intelligence Gathering [gathering intel through public sources]
75
OWASP
Open Web Application Security Project [non-profit to help improve application security]
76
ALE
Annualized Loss Expectancy
77
SLE
Single Loss Expectancy
78
ARO
Annualized Rate of Occurrence