Security + Acronyms Flashcards
Need To Study 7,8 (58 cards)
Which of the following answers refers to a unique 48-bit address assigned to every network adapter?
SSID, MAC or PIN ?
MAC (Media Access Control)
A unique 48-bit (6-byte) hardware identifier assigned to every network interfaces/ adapter.
Analogy: Like a fingerprint for your network card.
In older, non-UEFI based PCs, the first sector of a storage drive containing information about partitions and a piece of executable code used to load the installed OS is called:
MBR, GPT or GUID ?
MBR (Master Boot Record)
The first sector of a storage device that contains boot instructions and partition table.
Analogy: Like a table of contents and startup instructions for your hard drive.
In cloud computing, users on an on-premises network take advantage of a transit gateway to connect to:
VPC, VLAN or Wan ?
VPC (Virtual Private Cloud)
An isolated cloud computing environment within a public cloud.
Analogy: Like having a private office suite in a shared office building.
Which of the answers listed below refer to DSA? (Select 3 answers)
DSA (Digital Signature Algorithm)
A method used for digital signatures to verify authenticity. Like signing a contract electronically, used for generating and verifying digital signatures.
- Asymmetric algorithm
- Provides authentication, integrity, and non-repudiation
- Specifically designed for creating and verifying digital signatures
Which of the answers listed below describe(s) the characteristics of ECDSA? (Select all that apply)
ECDSA (Elliptic Curve Digital Signature Algorithm)
Based on elliptic curve cryptography Its a digital signature method that provides strong security with smaller keys. Like a compact but powerful lock, used for generating and verifying digital signatures.
- Provides authentication, integrity, and non-repudiation.
- Based on elliptic curve cryptography.
- Specifically designed for creating and verifying digital signatures.
- More computationally efficient than other signature algorithms
Which of the following answers refers to a deprecated stream cipher used in some legacy applications, such as WEP?
DES, RC4 or RSA
RC4 (Rivest Cipher 4)
A stream cipher (now considered insecure) once used in SSL/TLS and WEP.
Analogy: Like a broken lock that shouldn’t be used anymore.
Which of the answers listed below refers to a wireless network authentication protocol that enhances security by encapsulating the authentication process within an encrypted TLS tunnel?
PEAP, EAP or LEAP ?
PEAP (Protected Extensible Authentication Protocol)
Encapsulates EAP within a TLS tunnel for secure authentication. Analogy: Like having a private conversation inside a soundproof booth.
A type of metric used to evaluate the profitability of an investment by comparing the return generated from the investment relative to its cost is referred to as:
ROA, ROI or ROS ?
ROI (Return on Investment)
Measurement of the profitability of an investment. Analogy: Like calculating if the money you put into security is actually saving you money.
Which of the answers listed below refers to an identifier used for objects in a PKI, such as CAs, digital certificates, and public key algorithms?
OID, GUID or DN ?
OID (Object Identifier)
A unique string of numbers that identifies objects in computing. Analogy: Like a social security number for software components.
Which of the following answers refers to a solution designed to strengthen the security of session keys?
ECB, PFS or EFS?
PFS (Perfect Forward Secrecy)
Ensures session keys can’t be derived from long-term keys if compromised. Analogy: Like using disposable keys that self-destruct after each use.
Which of the answers listed below refers to a twisted-pair copper cabling type not surrounded by any shielding that would provide protection against interference from outside sources?
UTP, Twinax or STP ?
UTP (Unshielded Twisted Pair)
Common network cable type (e.g., Cat5e, Cat6). Analogy: Like the standard electrical wiring for your network.
Which of the following terms refers to a technology that enables real-time audio and video communication between individuals or groups?
VPC, VTC or VoIP ?
VTC (Video Teleconferencing)
Secure video communication systems. Analogy: Like a high-security boardroom meeting over video.
A dedicated data storage solution that combines multiple disk drive components into a single logical unit to increase volume size, performance, or reliability is known as:
SAN, RAID or JBOD ?
RAID (Redundant Array of Independent Disks)
Data storage virtualisation technology. Analogy: Like having multiple copies of your important files on different shelves.
Which of the answers listed below can be used to describe XSRF? (Select 3 answers)
XSRF (Cross-Site Request Forgery)
Attack that tricks users into executing unwanted actions. Analogy: Like someone forging your signature on a check while you’re logged in to your bank.
- Exploits the trust a website has in the user’s web browser.
- Website executes attacker’s requests.
- A user is tricked by an attacker into submitting unauthorised web requests.
Which of the following answers can be used to describe the characteristics of an XSS attack? (Select 3 answers)
XSS (Cross-Site Scripting)
Injection attack where malicious scripts are executed in web pages.
Analogy: Like someone slipping a poisoned note into a stack of papers you’re about to read.
- Exploits the trust a user’s web browser has in a website.
- A malicious script is injected into a trusted website.
- User’s browser executes attacker’s script.
Which of the answers listed below refers to an encoding method (and a file format) for storing cryptographic objects such as X.509 certificates, CRLs, and private keys?
FIM, PEM or PFS?
PEM (Privacy Enhanced Mail)
Base64 encoded format for certificates and keys. Analogy: Like a standardised envelope for sending digital security credentials.
Which of the following answers refers to a centralised server that is used to distribute cryptographic keys and authenticate users and services within a computer network?
PKI, KDC or RAS ?
KDC (Key Distribution Centre)
Part of Kerberos that authenticates users and issues tickets. Analogy: Like a passport office that issues travel documents after verifying your identity.
An AI feature that enables it to accomplish tasks based on training data without explicit human instructions is called:
AGI, ML, LLM ?
ML (Machine Learning)
AI that improves automatically through experience. Analogy: Like a security guard that gets smarter the more threats they see.
Which data packet type is specifically used to detect and prevent network loops in Ethernet networks?
MTU, BPDU or Jumbo Frame ?
BPDU (Bridge Protocol Data Unit)
Messages exchanged in spanning tree protocol (STP) networks. Analogy: Like traffic signals between network bridges to prevent loops.
Which of the answers listed below refers to a key exchange protocol that generates temporary keys for each session, providing forward secrecy to protect past and future communications?
DHE, PFS or SHA ?
DHE (Diffie-Hellman Ephemeral)
Key exchange method that generates temporary session keys. Analogy: Like creating a secret handshake that changes every time you meet.
Which of the following terms refers to a method for managing infrastructure resources through scripts and templates?
IaaS, IaC or ML ?
IaC (Infrastructure as Code)
Managing and provisioning infrastructure through machine-readable files.
Analogy: Like writing a recipe to automatically build your network environment.
Which of the following answers refers to a cybersecurity framework that combines network and security functions into a single cloud-based service?
SASE, SOAR or SIEM ?
SASE (Secure Access Service Edge)
Converges network and security services into cloud-delivered platform.
Analogy: Like having a security checkpoint in the cloud for all your network traffic.
A process used by organizations to assess and evaluate the potential impact of disruptive incidents or disasters on their critical business functions and operations is referred to as:
BIA, BPA or BCP ?
BIA (Business Impact Analysis)
Process to determine potential effects of disruption to business functions. Analogy: Like a stress test for your business operations.
Which of the answers listed below refers to one of the last stages in SDLC?
UCD, UAT or AUT ?
UAT (User Acceptance Testing)
Final testing phase where end users verify the system. Analogy: Like a test drive before buying a new car.