Terms A Flashcards

(31 cards)

1
Q

Absolute file path

A

The full file path, which starts from the root

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Access controls

A

Security controls that manage access, authorization, and
accountability of information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Active packet sniffing

A

A type of attack where data packets are manipulated in transit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Address Resolution Protocol (ARP)

A

A network protocol used to determine the MAC
address of the next router or device on the path

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Advanced persistent threat (APT)

A

An instance when a threat actor maintains
unauthorized access to a system for an extended period of time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Adversarial artificial intelligence (AI):

A

A technique that manipulates artificial
intelligence (AI) and machine learning (ML) technology to conduct attacks more
efficiently

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Adware

A

A type of legitimate software that is sometimes used to display digital
advertisements in applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Algorithm

A

A set of rules used to solve a problem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Analysis

A

The investigation and validation of alerts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Angler phishing

A

A technique where attackers impersonate customer service
representatives on social media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Anomaly-based analysis

A

A detection method that identifies abnormal behavior

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Antivirus software

A

A software program used to prevent, detect, and eliminate
malware and viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Application

A

A program that performs a specific task

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Application programming interface (API) token

A

A small block of encrypted code
that contains information about a user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Argument (Linux)

A

Specific information needed by a command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Argument (Python)

A

The data brought into a function when it is called

17
Q

Array

A

A data type that stores data in a comma-separated ordered list

18
Q

Assess

A

The fifth step of the NIST RMF that means to determine if established controls
are implemented correctly

19
Q

Asset

A

An item perceived as having value to an organization

20
Q

Asset classification

A

The practice of labeling assets based on sensitivity and
importance to an organization

21
Q

Asset inventory

A

A catalog of assets that need to be protected

22
Q

Asset management

A

The process of tracking assets and the risks that affect them

23
Q

Asymmetric encryption

A

The use of a public and private key pair for encryption and
decryption of data

24
Q

Attack surface

A

All the potential vulnerabilities that a threat actor could exploit

25
Attack tree
A diagram that maps threats to assets
26
Attack vectors
The pathways attackers use to penetrate security defenses
27
Authentication
The process of verifying who someone is
28
Authorization
The concept of granting access to specific resources in a system
29
Authorize
The sixth step of the NIST RMF that refers to being accountable for the security and privacy risks that might exist in an organization
30
Automation
The use of technology to reduce human and manual effort to perform common and repetitive tasks
31
Availability
The idea that data is accessible to those who are authorized to access it