Ack Flashcards

1
Q

NT LAN (NTLM)

A

Windows New Technology LAN Manager (NTLM) is an outmoded challenge-response authentication protocol from Microsoft. Still in use though succeeded by Kerberos, NTLM is a form of Single Sign-On (SSO) enabling users to authenticate to applications without submitting the underlying password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

3DES

A

Triple Digital Encryption Algorithm (deprecated)

symmetric-key block cipher applies the DES cipher algorithm three times to each data block - 168 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

AAA

A

Authentication, Authorization, and Accounting
It is used to refer to a family of protocols that mediate network access. Two network protocols providing this functionality are particularly popular: the RADIUS protocol, and its newer Diameter counterpart

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ABAC

A

Attribute-based Access Control
also known as policy-based access control for IAM, defines an access control paradigm whereby access rights are granted to users through the use of policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

ACL

A

Access Control List

a list of permissions associated with a system resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

AD

A

Active Directory
access policies can be configured via GPOs Windows Active Directory network, users and devices can often auto-enroll with the CA just by authenticating to Active Directory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

AES

A

Advanced Encryption Standard

specification for the encryption of electronic data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

AES256

A

Advanced Encryption Standards 256bit
AES-256, which has a key length of 256 bits, supports the largest bit size and is practically unbreakable by brute force based on current computing power, making it the strongest encryption standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

AH

A

Authentication Header
provides message authentication and integrity but not confidentiality.

performs a cryptographic hash on the whole packet, including the IP header, plus a shared secret key (known only to the communicating hosts), and adds this HMAC in its header as an Integrity Check Value (ICV).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

AIS

A

Automated Indicator Sharing
Threat intelligence data feed operated by the DHS.
Uses TAXII to transmit CTI data between servers and clients

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

ALE

A

Annualized Loss Expectancy
the amount that would be lost over the course of a year. This is determined by multiplying the SLE by the Annualized Rate of Occurrence (ARO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

AP

A

Access Point
device that provides a connection between wireless devices and can connect to wired networks. Also known as wireless access point or WAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

API

A

Application Programming Interface
A library of programming utilities used, for example, to enable software developers to access functions of the TCP/IP network stack under a particular operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

APT

A

Advanced Persistent Threat
An attacker’s ability to obtain, maintain, and diversify access to network systems using exploits and malware.
Can evade signature-based detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ARP

A

Address Resolution Protocol

maps a network interface’s hardware (MAC) address to an IP address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

ASLR

A

Address Space Layout Randomization
A memory-protection process - computer security technique involved in preventing exploitation of memory corruption vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

ASP

A

Active Server Pages

Microsoft’s first server-side scripting language and engine for dynamic web pages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

ATT&CK

A

Adversarial Tactics, Techniques, and Common Knowledge
MITRE ATT&CK™ framework is a comprehensive matrix of tactics and techniques used by threat hunters, red teamers, and defenders to better classify attacks and assess an organization’s risk. Organizations can use the framework to identify holes in defenses, and prioritize them based on risk (TTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

AUP

A

Acceptable Use Policy
set of rules applied by the owner, creator or administrator of a network, website, or service, that restrict the ways in which the network, website or system may be used and sets guidelines as to how it should be used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

AV or A-V

A

Antivirus

prevent, detect, and remove malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

BASH

A

Bourne Again Shell
A command shell and scripting language for Unix-like system
Found in DMZ

22
Q

BCP

A

Business Continuity Planning
identifies controls and processes that enable an organization to maintain critical workflows in the face of some adverse event

23
Q

BIA

A

Business Impact Analysis

process of assessing what losses might occur for a range of threat scenarios

24
Q

BGP

A

Border Gateway Protocol
exterior gateway protocol designed to exchange routing and reachability information between autonomous systems (AS) on the Internet
Decides which network your local router should hookup with. (think matchmaker)

25
Q

BIOS

A

Basic Input/Output System
Firmware—vulnerabilities can exist in the BIOS/UEFI firmware that controls the boot process for PCs.
“the program a computer’s microprocessor uses to start the computer system after it is powered on”

26
Q

BPA

A

Business Partnership Agreement

Agreement by two companies to work together closely

27
Q

BPDU

A

Bridge Protocol Data Unit
Switch port security feature that disables the port if it receives BPDU notifications related to spanning tree.
This is configured on access ports where there any BPDU frames are likely to be malicious
Messages exchanged between switches inside a LAN; prevents looping

28
Q

BSSID

A

Basic Service Set Identifier

Each WAP is identified by its MAC address, BSSID is the MAC address of a wireless point

29
Q

BYOD

A

Bring Your Own Device

30
Q

CA

A

Certificate Authority

entity responsible for issuing and guaranteeing certificates

31
Q

CAC

A

Common Access Card

smart card that provides certificate-based authentication and supports two-factor authentication

32
Q

CAPTCHA

A

Completely Automated Public Turing

Test to Tell Computers and Humans Apart

33
Q

CAR

A

Corrective Action Report

actions adopted to eliminate the problem from occurring again

34
Q

ML

A

Machine Learning

35
Q

MMS

A

Multimedia Message Service

36
Q

MOA

A

Memorandum of Agreement

written (legal) document describing a cooperative relationship between two parties wishing to work together

37
Q

MOU

A

Memorandum of Understanding

Intent to work together (informal, not binding)

38
Q

MPLS

A

Multiprotocol Label Switching
Developed by Cisco data forwarding technology that increases the speed and controls the flow of network traffic.
A VPN (not part of public internet) that directs data from one node to the next using short path labels instead of long network addresses.

39
Q

MSA

A

Measurement System Analysis

Cyber, Evaluates the data collection and statistical methods used by a quality management process

40
Q

MSCHAP

A

MS Challenge Handshake Authentication Protocol

41
Q

MSP

A

Managed Service Provider
a third-party company that provides network, application and system management services to enterprises with a pay-as-you-go pricing model

42
Q

MSSP

A

Managed Security Service Provider
fully outsourcing responsibility for information assurance to a third party.
Expensive but can be a good fit for an SME that has experienced rapid growth and has no in-house security capability

43
Q

MTBF

A

Mean Time Between Failures

44
Q

MTTF

A

Mean Time to Failure

45
Q

MTTR

A

Mean Time to Repair

46
Q

MTU

A

Maximum Transmission Unit

limits data packet size on a network

47
Q

NAC

A

Network Access Control
Keeps unauthorized users and devices out of a private network
802.1X standard

48
Q

NAS

A

Network-attached Storage
storage device connected to a network that allows storage and retrieval of data from a centralized location for authorized network users

49
Q

NAT

A

Network Address Translation

used to enable multiple hosts on a private network to connect to the Internet using a single public IP address

50
Q

NDA

A

Non-disclosure Agreement