Ack2 Flashcards

1
Q

CASB

A

Cloud Access Security Broker

enterprise management software designed to mediate access to cloud services by users across all types of devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

CBC

A

Cipher Block Chaining
ensures that no plaintext block produces the same ciphertext. CBC needs to use padding to ensure that the data to encrypt is an exact multiple of the block s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

CBT

A

Computer-based Training

lets a student acquire skills & experience by completing various activities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

CCMP

A

Counter-Mode/CBC-MAC Protocol
provides authenticated encryption, which is designed to make replay attacks harder

Cipher Block chaining encryption on the LAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

CERT

A

Computer Emergency Response Team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

CFB

A

Cipher Feedback

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

CHAP

A

Challenge-Handshake Authentication Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

CIO

A

Chief Info Officer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

CIRT

A

Computer Incident Response Team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

CIS

A

Center for Internet Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

CMS

A

Content Management System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

CN

A

Common Name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

COOP

A

Continuity of Operations Planning

refers to the same sorts of activities when undertaken by a government agency, rather than a business

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

COPE

A

Corporate-owned Personally Enabled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

CP

A

Contingency Planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

CRC

A

Cyclic Redundancy Check

a code added to data which is used to detect errors occurring during transmission, storage, or retrieval.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

CRL

A

Certificate Revocation List

lets you know about suspended or revoked keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

CSA

A

Cloud Security Alliance

Industry body providing security guidance to CSP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

CSIRT

A

Computer Security Incident Response Team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

CSO

A

Chief Security Officer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

CSP

A

Cloud Service Provider

22
Q

CSR

A

Certificate Signing Request
Base64 ASCII file that a subject sends to a CA to get a certificate
Use for online CA and make the root an offline CA (to make it secure)

23
Q

XSRF (CSRF)

A

Cross-Site Request Forgery
A malicious script hosted on the attacker’s site that can exploit a session started on another site in the same browser.

user unintentionally makes changes

24
Q

CSU

A

Channel Service Unit WAN (wide area network port: used to connect to an internet source) router performs loopback testing

25
Q

CTM

A

Counter-Mode

An encryption mode of operation where a numerical counter value is used to create a constantly changing IV

26
Q

CCMP

A

CCMP (counter mode with cipher block chaining message authentication code protocol) An encryption protocol used for wireless LANs that addresses the vulnerabilities of the WEP protocol

27
Q

CTO

A

Chief Technology Officer

28
Q

CYOD

A

Choose Your Own Device

29
Q

DAC

A

Discretionary Access Control

Access control model where each resource is protected by an Access Control List (ACL) managed by the resource’s owner

30
Q

DDoS

A

Distributed Denial-of-Service

An attack that uses multiple compromised hosts (a botnet) to overwhelm a service with request or response traffic

31
Q

DEP

A

Data Execution Prevention
system-level memory protection feature, Windows OS (legacy) mark pages as non-executable

helps prevent damage from viruses or malicious code exploits

32
Q

NFC

A

Near-field Communication
A standard for peer-to-peer (2-way) radio communications over very short (around 4”) distances, facilitating contactless payment and similar technologies. Based on RFID

33
Q

NFV

A

Network Function Virtualization

Provisioning virtual network appliances, such as switches, routers, and firewalls, via VMs and containers

34
Q

NGFW

A

Next-Generation Firewall

35
Q

NG-SWG

A

Next-Generation Secure Web Gateway

36
Q

NIC

A

Network Interface Card

hardware component without which a computer cannot be connected over a network. It is a circuit board

37
Q

NOC

A

Network Operations Center

monitor/manage network systems

38
Q

NTFS

A

New Technology File System
Stores time values in UTC format used internally Controls storage space on a drive (store/read info on computer that’s not easily removed)

39
Q

NTLM

A

New Technology LAN Manager

challenge-response authentication protocol created by Microsoft for use in its products

40
Q

NTP

A

Network Time Protocol

Helps servers on a network & on the internet keep the correct time

41
Q

OAUTH

A

Open Authentication
Standard for federated identity management, allowing resource servers or consumer sites to work with user accounts created and managed on a separate identity provider (let users give website their info w/o a PW)

42
Q

OCSP

A

Online Certificate Status Protocol

Allows clients to request the status of a digital certificate, to check whether it is revoked.

43
Q

OID

A

Object Identifier
used for attributes of digital certificates.
onboarding The process of bringing in a new employee, contractor, or supplier

44
Q

OSI

A

Open System Interconnection

The 7 layers used for networks

45
Q

OSINT

A

Open-source Intelligence

operate threat intelligence services on an open-source basis, earning income from consultancy

46
Q

OSPF

A

Open Shortest Path First

link-state routing protocol providing fast convergence and excellent scalability

47
Q

OT

A
Operational Technology
network is established between embedded systems
devices and their controllers.
i.e. valves, motors, gauges, sensors
DDoS can be used
48
Q

OTA

A

Over-The-Air

updates can be delivered wirelessly, either through a Wi-Fi network or the data connection

49
Q

OTG

A

On-The-Go

Android USB ports, allow a port to be a host or a device

50
Q

Port

A

A number used to uniquely identify a transaction over a network by specifying both the host, and the service