Security+ Set C Flashcards

(59 cards)

1
Q

C&C (command and control)

A

infrastructure of hosts and services with which attackers, direct, distribute, and control malware over botnets. Also known as C2.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

CA Certificate Authority

A

a server that guarantees subject identities by issuing signed digital certificate wrappers for their public keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

CAC (common access card)

A

certificate based authentication and supports two-factor authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

CAN (controller area network bus)

A

A serial network designed to allow communications between embedded programmable logic controllers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

CAPTCHA (completely automated public turing test to tell computers and humans apart)

A

difficult for computers to interpret

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

CASB (cloud access security broker)

A

enterprise management software designed to mediate access to cloud services by users across all types of devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

CBC (cipher block chaining)

A

an encryption mode of operation where an exclusive or (XOR) is applied to the first plaintext blockglossary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

CCMP (counter mode with cipher block chaining message authentication code protocol)

A

encryption protocol used for wireless LANs that addresses the vulnerabilities of the WEP protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

CE (cryptographic erase)

A

method of sanitizing a self-encrypting drive by erasing the media encryption key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

CHAP (challenge handshake authentication protocol)

A

for dial up networks that uses encrypted 3 way handshake to authenticate client to server. The challenge response is repeated through the connection to guard against replay attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

CIA Triad

A

Also known as AIC triad. principles of security control and management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

CIS (center for internet security)

A

not for profit organization. It publishes the well known top 20 critical security controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

CN (common name)

A

An X500 attribute expressing a host or user name, also used as the subject identifier for a digital certificate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

COBO (corporate owned, business only)

A

Enterprise mobile device provisioning model where the device is the property of the organization and personal use is prohibited.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

COPE (corporate owned, personally enabled)

A

Enterprise mobile device provisioning model where the device remains the property of the organization, but certain personal use, such as private email, social networking, web browsing is permitted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

CRL (certificate revocation list)

A

a list of certs that were revoked before their expiration date

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

CSP (cloud service provider)

A

vendor offering cloud models

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

CSR (cert signing request)

A

base64 ASCII file that subject sends to a CA to get a certificate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

CTI (cyber threat intel)

A

process of ivestigating, collecting, analyzing, and diseminating info about emerging threats and sources. also known as threat intel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

CVE (common vulnerabilities and exposures)

A

scheme for identifying vulnerabilities developed by MITRE and adopted by NIST

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

CVSS (common vulnerability scoring system)

A

risk mgmt. approach to quantifying vulnerability data and then taking into account the degree of risk to different types of systems or information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

CYOD (choose your own device)

A

enterprise mobile device provisioning model where employees are offered a selection of corporate devices for work and optionally private use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Cloud Security Alliance

A

industry body providing security guidance to CSPs, including enterprise reference architecture and security controls matrix.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Cuckoo

A

implementation of sandbox for malware analysis

25
cable lock
physical secure against theft.
26
captive portal
a web page or website to which a client is redirected before being granted full network access.
27
capture the flag
training event where learners must identify a token within a live network environment
28
card cloning skimming
duplicating smart card by reading the confidential data stored on it.
29
carving
process of exgtracting data from a computer when that data has no associated file system metadata
30
cat command
linux command to view and combine (concatenate) files.
31
chain of custody
the record of evidence history from collection, to presentation in court, to disposal
32
change control
process by which the need for change is recorded and approved.
33
change mgmt.
process through which changes to configuration of info systems are implemented,.
34
checksum
output of a hash function. chmod Linux command for managing file permissions.
35
circuit-level stateful inspection firewall
a Layer 5 firewall technology that tracks the active state of a connection, and can make decisions based on the contents of network traffic as it relates to the state of the connection.
36
clean desk policy
organizational policy that mandates employee work areas be free from potentially sensitive information; sensitive docs must not be left out hwere unauthorized personnel might see them.
37
cloud deployment model
classifying the ownership and managemtn of a cloud as public, private, community, or hybrid
38
cloud service model
classifying the provision of cloud services and the limit of the provider's responsibility as a software, platform, infrastructure and so on.
39
code of conduct
professional behavior depend s on basic ethical standards.
40
code reuse
potentially unsecure programming practice of using code originally written for a different context.
41
code signing
method of using a digital signature to ensure the source and integrity of programming code.
42
cold site
predetermined alternate location where a network can be rebuilt after a disaster.
43
collector
network appliance that gathers or receives log and/or state data from other network systems
44
collision
in cryptography, the act of two different plaintext inputs producing the same exact ciphertext output.
45
community cloud
cloud deployed for shared use by cooperating tenants
46
compensating control
security measure that takes on risk mitigation when a primary control fails or cannot completely meet expectations
47
confidentiality
keeping info and comm private and protecting them from unauthorized access.
48
content filter
software app or gateway that filters client requests for various types of internet content.
49
context-aware authentication
access control scheme that verifies an objects identity based on various environmental facgtors, like time, location, and behavior
50
continuous delivery
software development method in which app and platform requirements are frequently tested and validated for immediate availability
51
continuous deployment
software development method in which app and platform updates are committed to production rapidly
52
continuous integration
method in which code updates are tested and committed to a development or build server/code repository rapidly.
53
continuous monitoring
constantly evaluating an environment for changes so that new risks may be more quicky detected and business operations improved upon. Also known as continuous security monitoring.
54
control risk
risk that arises when a control does not provide the level of mitigation that was expecgted
55
corrective control
control that acts after an incident to eliminate or minimize its impact.
56
counter mode (CTM)
encryption mode of operation where a numerical counter value is used to create a constantly changing IV
57
credential stuffing
brute force attack in which stolen user account names and passwords are tested against multiple websites
58
crossover error rate
biometric evaluation factor expressing the point at which FAR and FRR meet, with a low value indicating better performance.
59
curl command
utility for command-line manipulation of URL-based protocol requests.