Terms C Flashcards

(35 cards)

1
Q

Categorize

A

The second step of the NIST RMF that is used to develop risk management processes and tasks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

CentOS

A

An open-source distribution that is closely related to Red Hat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Central Processing Unit (CPU)

A

A computer’s main processor, which is used to perform general computing tasks on a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Chain of custody

A

The process of documenting evidence possession and control during an incident lifecycle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Chronicle

A

A cloud-native tool designed to retain, analyze, and search data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Cipher

A

An algorithm that encrypts information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Cloud-based firewalls

A

Software firewalls that are hosted by the cloud service provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Cloud computing

A

The practice of using remote servers, applications, and network services that are hosted on the internet instead of on local physical devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Cloud network

A

A collection of servers or computers that stores resources and data in remote data centers that can be accessed via the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Cloud Security

A

The process of ensuring that assets stored in the cloud are properly configured and access to those assets is limited to authorized users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Command

A

An instruction telling the computer to do something

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Command and control (C2)

A

The techniques used by malicious actors to maintain communications with compromised systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Command-line interface (CLI)

A

A text-based user interface that uses commands to interact with the computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Comment

A

A note programmers make about the intention behind their code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Common Event Format (CEF)

A

A log format that uses key-value pairs to structure data and identify fields and their corresponding values

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Common Vulnerabilities and Exposures (CVE®) list

A

An openly accessible dictionary
of known vulnerabilities and exposures

17
Q

Common Vulnerability Scoring System (CVSS)

A

A measurement system that scores
the severity of a vulnerability

18
Q

Compliance

A

Compliance: The process of adhering to internal standards and external regulations

19
Q

Computer Security Incident Response Teams (CSIRT)

A

A specialized group of security professionals that are trained in incident management and response

20
Q

Computer virus

A

Malicious code written to interfere with computer operations and cause damage to data and software

21
Q

Conditional statement

A

A statement that evaluates code to determine if it meets a specified set of conditions

22
Q

Confidentiality

A

The idea that only authorized users can access specific assets or data

23
Q

Confidential data

A

Data that often has limits on the number of people who have
access to it

24
Q

Configuration file

A

A file used to configure the settings of an application

24
Confidentiality, integrity, availability (CIA) triad
A model that helps inform how organizations consider risk when setting up systems and security policies
25
Containment
The act of limiting and preventing additional damage caused by an incident
26
Controlled zone
A subnet that protects the internal network from the uncontrolled zone
27
Crowdsourcing
The practice of gathering information using public input and collaboration
28
Cross-site scripting (XSS)
An injection attack that inserts code into a vulnerable website or web application
29
Cryptographic attack
An attack that affects secure forms of communication between a sender and intended recipient
30
Cryptographic key
A mechanism that decrypts ciphertext
31
Cryptography
The process of transforming information into a form that unintended readers can’t understand
32
CVE Numbering Authority (CNA)
An organization that volunteers to analyze and distribute information on eligible CVEs
33
Cryptojacking
A form of malware that installs software to illegally mine cryptocurrencies
34
Cybersecurity (or security)
The practice of ensuring confidentiality, integrity, and availability of information by protecting networks, devices, people, and data from unauthorized access or criminal exploitation