A Flashcards

1
Q

Acceptable Use Policy (AUP)

A

A document that provides network and system users with a clear direction on permissible uses of information resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Access badges

A

Used for entry access via magnetic stripe and radio frequency ID access system and when including a picture, allows personal to determine if the person is who they say they are.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Access control list (ACL)

A

Rule that either permits or denies actions?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does ACL mean?

A

Access control list (ACL) and it is a rule that either permits or denies actions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Access restrictions

A

Security measures that limit the ability of individuals or systems to access sensitive information or resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Account Lockout

A

Accounts are often locked out after failed login attempts. Maybe an indictor of compromised because of brute force.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Acknowledgement

A

Ensuring that employees and business partners state that they are aware of the compliance requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Active/active load balancer

A

A kind of load balancer that brings backup or secondary systems online when an active system is removed or fails to respond properly to a health check. 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Active reconnaissance

A

A technique that directly engages the target in intelligence gathering.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Ad Hoc reports

A

Reports that are produced as needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Ad Hoc risk assessment

A

Conducted in response to a specific event or situation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

802.1X

A

The IEEE standard that defines port-based security for network access control 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Adaptive identity

A

Often called adaptive authentication, it leverages context-based authentication that considers data points like where the user is logging in from, what device they are logging in from, and whether the device meets security and configuration requirements. 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Address resolution protocol (ARP)

A

A protocol that provides translations between MAC addresses and IP addresses on a local network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Adversarial artificial intelligence (AI)

A

The use of artificial intelligence techniques by attackers for malicious purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Adversary tactics, techniques, and procedures (TTPs)

A

The study of the methods used by cyber security adversaries when engaging in attacks. 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Agents

A

Software that is deployed to endpoints allowing them to perform actions or to be controlled by central server or services. 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Agent based scanning

A

The use of software agents installed on target devices to assist with vulnerability scans.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Agile

A

A software development model that is both iterative and incremental.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Agility

A

The speed to provision cloud resource and ability to use them for short periods of time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Advance Persistent Threats (APT)

A

Cybersecurity adversary characterized by a sophisticated series of related attacks taking placed over an extended period of time.3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Air gapped

A

A design that physically separates network segments, preventing network connectivity between those segments.

23
Q

Algorithm

A

A set of rules, that dictates how enciphering and deciphering process are to take place.

24
Q

Allow listing

A

The most effective form of input validation in which the developer describes the exact type of input that is expected from the user and then verifies that the input matches that specification before passing the input to other processes or servers.

25
Q

Alteration

A

The unauthorized modification of information and validation of the principles of integrity.

26
Q

Amplified denial of serice attacks

A

An amplified denial of service attack takes advantage of protocols that allow a small query to return large results like a DNS query. 4

27
Q

Annualized loss expectancy (ALE)

A

The possible yearly cost of all instances of a specific realized threat against a specific asset. THE ALE is calculated using the formula ALE=Single loss expectancy (SLE) *Annualized rate of occurrence (ARO)

28
Q

Annualized Rate of Occurrence ARO

A

Annualized Rate of Occurrence ARO- The expected frequency that a specific threat or risk will occur within a single year.

29
Q

Anomalous behavior recognition

A

Employees should be able to recognize when risky, unexpected, and or unintentional behavior takes place. 4

30
Q

Anomaly detection

A

A method of detecting abnormal or malicious events by looking for abnormal occurrences or violations of specified rules. 4

31
Q

API-based CASB solution

A

Cloud access security broker solutions do not interact directly with the user but rather interact directly with the cloud provider through the providers API 4

32
Q

API inspection

A

A technology that scrutinizes API requests for security issues.

33
Q

Application programming interfaces (API)

A

Application programming interfaces (API)- API’s allow application developers to interact directly with a web service through function calls. 4

34
Q

Assessment

A

Reviews of security controls that are typically requested by the security organization itself in an effort to engage in process improvement. 4

35
Q

Assest Critically

A

Determination of the importance of an asset to the business. 4

36
Q

Assest Inventory

A

Systematic method of tracking hardware, software, and information assets owned by an organization. 4

37
Q

Asset management

A

A process that the organization will follow for accepting new assets into inventory, tracking those assets over their life time, and properly disposing of them at the end of the useful life. 4

38
Q

Asset Value AV

A

Asset Value (AV)– A dollar value assigned to an asset based on actual cost and nonmonetary expenses. 4

39
Q

Asymmetric Key Algorithms

A

Cryptographic algorithms that use two different keys: one key to encrypt and another to decrypt. Also called public key cryptography.

40
Q

ATT & CK

A

A public knowledge based describing adversarial techniques and tactics maintained by MITRE

41
Q

Attack Complexity Metric (AC)

A

Attack Complexity Metric (AC)- A metric that describes the difficulty of exploiting a vulnerability. 5

42
Q

Attack Surface

A

A system, application, or service that contains a vulnerability that might be exploited. 5

43
Q

Attestation

A

A primary outcome of an audit by an auditor, It is a formal statement that the auditors have reviewed the controls and found that they are both adequate to meet the control objectives and working properly. 5

44
Q

Attack Vector Metric (AV)

A

Attack Vector Metric (AV)- A metric that describes how an attacker would exploit a vulnerability.5

45
Q

Attribute based access control (ABAC)

A

Attribute based access control (ABAC)- An advance implementation of a rule based access control model that uses polices that include multiple attributes for rules. 5

46
Q

Auditability

A

Cloud computing contracts should include language guaranteeing the right of the customer to audit cloud service providers. 5

47
Q

Audits

A

Formal reviews of an organization’s security program or specific compliance issues conducted on behalf of a third party.

48
Q

Authentication

A

Verifies the claimed identity of system users and is a major function of Cryptosystems. 5

49
Q

Authentication Header (AH)

A

Authentication Header (AH)- Uses hashing and a shared secret key to ensure integrity of data and validates senders by authenticating the IP packets that are sent. AH can ensure that IP payload and headers are protected. 5

50
Q

Authority

A

A Key principle that relies on the fact that most people will obey someone who appears to be in charge or knowledgeable, whether or not they are. 5

51
Q

Authorized attackers

A

hackers who act with authorization and seek to discover security vulnerabilities with the intent of correcting them . 5

52
Q

Availability

A

Ensures that information and systems are ready to meet the needs of legitimate users at the time those users request them. 5

53
Q

Availability Metric (A)

A

Availability Metric (A) - A metric that describes the type of distribution that might occur if an attacker successfully exploits a vulnerability. 5