Acronyms Flashcards

1
Q

Triple Digital Encryption Standard

(Symmetric Encryption)

A

3DES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Authentication, Authorization, and Accounting

(RADIUS)

A

AAA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Attribute-based Access Control

Access Control technique that evaluates a set of attributes that each subject possesses to determine if access should be granted.

A

ABAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Access Control List

Collection of Access Control Entries.

A

ACL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Advanced Encryption Standard

Symmetric Block Cipher

A

AES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Advanced Encryption Standards 256bit

Symmetric Block Cipher

A

AES256

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Authentication Header

IPSec protocol that provides authentication, integrity and protection against replay attacks.

A

AH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Artificial Intelligence

Science of creating machines with the ability to develop problem solving and analysis without significant human direction or intervention.

A

AI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Automated Indicator Sharing

Threat intelligence data feed operated by the DHS.

A

AIS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Annualized Loss Expectancy

Expected cost of a realized threat over a given year.
SLE (Single Loss Expectancy) x
ARO (Annual Rate of Occurrence)

A

ALE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Access Point

A

AP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Application Programming Interface

Library of programming utilities used to enable software developers to access functions of another application.

A

API

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Advanced Persistent Threat

An attacker’s ability to obtain, maintain, and diversify access to network systems using exploits and malware.

A

APT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Annualized Rate of Occurrence

In risk calculation, the percentage of an asset’s value that would be lost during a security incident or disaster.

A

ARO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Address Resolution Protocol

The broadcast mechanism by which individual hardware MAC addresses are matched to an IP address on a local network segment.

A

ARP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Optional security feature of a switch that prevents excessive ARP replies from flooding a network segment.

A

ARP inspection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A network-based attack where an attacker with access to target local network segment redirects an IP address to the MAC address of a computer that is not the intended recipient.

A

ARP poisoning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Address Space Layout Randomization

Method used by programmers to randomly arrange the different address spaces used by a program or process to prevent buffer overflow exploits.

A

ASLR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Active Server Page

A

ASP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Adversarial Tactics, Techniques, and Common Knowledge.

A knowledge base maintained by the MITRE Corporation for listing and explaining specific adversary tactics, and procedures.

A

ATT&CK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Acceptable Use Policy

A

AUP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Antivirus

Software capable of detecting and removing virus infections and other types of malware.

A

A-V

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Bourne Again Shell

A

BASH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Business Continuity Planning

Disaster Recovery Planning - How business processes should deal with minor/disaster level disruption by ensuring that there is a processing redundancy supporting the workflow.

A

BCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Border Gateway Protocol

A path vector routing protocol used by ISPs to establish routing between one another.

A

BGP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Business Impact Analysis

A systematic activity that identifies organizational risks and determines their effect on ongoing, mission critical operations.

A

BIA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Basic Input/Output System

A

BIOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Business Partnership Agreement

An agreement between two companies to work together closely, such as the partner agreement that large IT companies set up with resellers and solution providers.

A

BPA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Bridge Protocol Data Unit

Used to communicate information about the topology and are not expected on access port.

A

BPDU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Bring Your Own Device

A

BYOD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Certificate Authority

A server that guarantees subject identities by issuing signed digital certificate wrappers for their public keys.

A

CA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Completely Automated Public Turing Test to Tell Computers and Humans Apart.

A type of security measure known as challenge-response authentication.

A

CAPTCHA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Corrective Action Report

A

CAR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Cloud Access Security Broker

Enterprise management software designed to mediate access to cloud services by users across all types of devices.

A

CASB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Cipher Block Chaining

An encryption mode of operation where an exclusive or (XOR) is applied to the first plaintext block.

A

CBC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Computer-based Training

Training and education programs delivered using computer devices and e-learning instructional models and design.

A

CBT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Counter-Mode/CBC-Mac Protocol

An encryption protocol used for wireless LANs that addresses the vulnerabilities of the WEP protocol.

A

CCMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Closed-Circuit Television

A TV system in which signals are not publicly distributed but are monitored, primarily for surveillance and security purposes.

A

CCTV

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Computer Emergency Response Team

A group of information security experts responsible for the protection against, detection of and response to an organization’s cybersecurity incidents.

A

CERT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Cipher Feedback

A mode in which the DES algorithm is used to encrypt the preceding block of cipher text. This block is then XORed with the next block of plain text to produce the next block of cipher text.

A

CFB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Challenge Handshake Authentication Protocol

Authentication scheme developed for dial-up networks that uses an encrypted three-way handshake to authenticate the client to the server.

A

CHAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Chief Information Officer

A

CIO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Computer Incident Response Team

Group is responsible for responding to security breaches, viruses and other potentially catastrophic incidents in enterprises that face significant security risks.

A

CIRT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Center for Internet Security

CIS is a forward-thinking nonprofit that harnesses the power of a global IT community to safeguard public and private organizations against cyber threats.

A

CIS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Content Management System

Helps companies manage digital content.

A

CMS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Continuity of Operation Planning

Sites that provide an alternate location for operations after a critical outage.

A

COOP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Corporate Owned Personal Enabled

Enterprise mobile device provisioning model where the device remains the property of the organization, but certain personal use, such as private email, social networking, and web browsing, is permitted.

A

COPE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Contingency Planning

A course of action designed to help an organization respond effectively to a significant future incident, event or situation that may or may not happen.

A

CP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Cyclical Redundancy Check

A network method designed to detect errors in the data and information transmitted over the network.

A

CRC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Certificate Revocation List

A list of certificates that were revoked before their expiration date.

A

CRL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Chief Security Officer

A

CSO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Cloud Service Provider

A vendor offering public cloud service models, such as PaaS, IaaS, or Saas

A

CSP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Certificate Signing Request

A Base64 ASCHII file that a subject sends to a CA to get a certificate.

A

CSR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Cross-Site Request Forgery

A malicious script hosted on the attackers site that can exploit a session started on another site in the same browser.

A

CSRF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Channel Service Unit

A digital communication device that is used to connect a digital line to a digital device. C

A

CSU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Counter-Mode

An encryption mode of operation where a numerical counter valued is used to create a constantly changing IV.

A

CTM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Chief Technology Officer

A

CTO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Common Vulnerabilities and Exposures

Scheme for identifying vulnerabilities developed by MITRE and adopted by NIST.

A

CVE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Common Vulnerability Scoring System

Risk management approach to quantifying vulnerability data and then taking into account the degree of risk to different types of systems or information.

A

CVSS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Choose Your Own Device

An employee provisioning model in which an organization allows people to select the mobile devices they would like, usually from a limited number of options.

A

CYOD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Discretionary Access Control

Access control model where each resource is protected by an Access Control List managed by the resource’s owner.

A

DAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Database Administrator

A

DBA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Distributed Denial of Service

An attack that uses multiple compromised hosts (a botnet) to overwhelm a service with request/response traffic.

A

DDoS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

Data Execution Prevention

(Windows operating systems) prevents malicious code from being executed from system memory locations

A

DEP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

Distinguished Encoding Rules

The binary format used to structure the information in a digital certificate.

A

DER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

Digital Encryption Standard

A symmetric-key algorithm for the encryption of digital data.

A

DES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

Dynamic Host Configuration Protocol

A client/server protocol that automatically provides an Internet Protocol (IP) host with its IP address and other related configuration information such as the subnet mask and default gateway.

A

DHCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

Dynamic Host Configuration Protocol

An attack in which an attacker responds to a client requesting address assignment from a DHCP server.

A

DHCP Spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

Diffie-Hellman Ephemeral

A cryptographic protocol that is based on Diffie-Hellman and that provides for secure key exchange by using ephemeral keys. DH - Asymmetric Algorithms.

A

DHE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

Domain Keys Identified Mail

Aprotocol that allows an organization to take responsibility for transmitting a message by signing it in a way that mailbox providers can verify.

A

DKIM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

Dynamic Link Library

A collection of small programs that larger programs can load when needed to complete specific tasks.

A

DLL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

Data Loss Prevention

A software solution that detects and prevents sensitive information from being stored on unauthorized networks.

A

DLP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

Domain Message Authentication Reporting and Conformance

An email authentication policy that protects against bad actors using fake email addresses disguised to look like legitimate emails from trusted sources.

A

DMARC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

Demilitarized Zone

A segment isolated from the rest of a private network by one or more firewalls that accepts connection from the Internet over designated ports.

A

DMZ

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

Destination Network Address Translaction

NAT service where private internal addresses are mapped to one or more public addresses to facilitate Internet connectivity for host on a local network via a router

A

DNAT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

Domain Name Service (Server)

A

DNS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

Domain Name System Security Extensions

A security protocol that provides authentication of DNS data and upholds DNS data integrity.

A

DNSSEC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

Denial of Service

Any type of physical, application, or network attack that affects the availability of a managed resource.

A

DoS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

Data Privacy Officer

Institutional data governance role with responsibility for complaint collection and processing of personal and sensitive data.

A

DPO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

Disaster Recovery Plan

A documented and resourced plan showing actions and responsibilities to be used in response to critical incidents.

A

DRP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

Digital Signature Algorithm

Public key encryption standard used for digital signatures that provides authentication and integrity verification for messages.

A

DSA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

Digital Subscriber Line

A family of technologies that are used to transmit digital data over telephone lines.

A

DSL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

Extensible Authentication Protocol

Framework for negotiating authentication methods that enable systems to use hardware-based identifier, such as fingerprint scanners or smart card readers, for authentication.

A

EAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

Electronic Code Book

A

ECB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

Elliptic Curve Cryptography

An symmetric encryption algorithm that leverage the algebraic structures of elliptic curves over finite fields to derive public/private key pairs.

A

ECC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

Elliptic Curve Diffie-Hellman Ephemeral

A cryptographic protocol that is based on Diffie-Hellman and that provides for secure key exchange keys and elliptic curve cryptography.

A

ECDHE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

Elliptic Curve Digital Signature Algorithm

Implementation of the DSA cipher that uses the ECC algorithm.

A

ECDSA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

Endpoint Detection and Response

A software agent that collects system data and logs for analysis by a monitoring systems to provide early detection of threats.

A

EDR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

Encrypted File System

A

EFS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

End of Life

Product life cycle phase where sales are discontinued and support options reduced over time.

A

EOL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

End of Service

Product life cycle phase where support is no longer available from the vendor.

A

EOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

Enterprise Resource Planning

A

ERP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

Electronic Serial Number

A

ESN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

Encapsulated Security Payload

Provides integrity, confidentiality, and authenticity of packets by encapsulating and encrypting them.

Transport mode - host-to-host transport mode only uses encryption of the payload of an IP packet but not its header. transport mode is used for transmission between hosts on a private network.

Tunnel mode - network tunnel is created which encrypts the entire IP packet (payload and header). Tunnel mode is commonly used for transmission between networks.

A

ESP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

File System Access Control List

A

FACL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

Full Disk Encryption

Encryption of all data on a disk (including system files, temporary files, and the page file can be accomplished via a supported OS, third-party software, or at the controller level by the disk device itself.

A

FDE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

Field Programmable Gate Array

A processor that can be programmed to perform a specific function by a customer rather than at the time of manufacture.

A

FPGA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

False Rejection Rate

Biometric assessment metric that measures the number of valid subjects who are denied access.

A

FRR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

File Transfer Protocol

A protocol used to transfer file between network hosts. VAriants included S(ecure)FTP, FTP with SSL (FTPS and FTPES) and T(rivial)FTP. FTP utilizes ports 20 and 21.

A

FTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

Secured File Transfer Protocol

A type of FTP using TLS for confidentiality.

A

FTPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

Galois Counter Mode

A mode of block chained encryption that provides message authenticity for each block.

A

GCM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

General Data Protection Regulation

PRovisions and requirement protecting the personal data of European Union (EU) citizens. Transfer of personal data outside the EU SIngle Market are restricted unless protected by like-for-like regulations, such as the US’s Privacy Shield requirements.

A

GDPR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

Gnu Privacy Guard

A complete and free implementation of the OpenPGP standard as defined by RFC4880 (also known as PGP). GnuPG allows you to encrypt and sign your data and communications; it features a versatile key management system, along with access modules for all kinds of public key directories.

A

GPG

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

Group Policy Object

On a Windows domain, a way to deploy per-user and per-computer settings such as password policy, account restrictions, firewall status, and so on.

A

GPO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

Global Positioning System

Means of determining a receiver’s position on the Earth based on information received from GPS satellites. The receiver must have line-of-sight to the GPS satellites.

A

GPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q

Graphics Processing Unit

A

GPU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q

Generic Routing Encapsulation

Provides a private path for transporting packets through an otherwise public network by encapsulating (or tunneling) the packets

A

GRE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
108
Q

High Availability

The property that defines how closely systems approach the goal of providing data availability 100 percent of the time while maintaining a high level of system performance.

A

HA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
109
Q

Hard Disk Drive

A

HDD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
110
Q

Host-Based Intrusion Detection System

A type of IDS that monitors a computer system for unexpected behavior or drastic changes to the systems state.

A

HIDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
111
Q

Host-Based Intrusion Prevention System

A type of IPS that monitors a computer system for unexpected behavior or drastic changes to the system’s state on an endpoint.

A

HIPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
112
Q

Hashed Message Authentication Code

A method used to verify both the integrity and authenticity of a message by combining a cryptographic hash of the message with a secret key.

A

HMAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
113
Q

HMAC based One Time Password

An algorithm that generates a one-time password using a hash-based authentication code to verify the authenticity of the message.

A

HOTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
114
Q

Hardware Security Module

An appliance for generating and storing cryptographic keys. This sort of solution may be less susceptible to tampering and insider threats than software based storage.

A

HSM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
115
Q

HyperText Markup Language

The basic scripting language used by web browsers to render pages on the world wide web. ·

A

HTML

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
116
Q

Hypertext Transfer Protocol

The protocol used to provide web content to browsers. HTTP uses port 80.

A

HTTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
117
Q

Hypertext Transfer Protocol over SSL/TLS

HTTPS(secure) provides for encrypted transfers, using SSL/TLS and port 443.

A

HTTPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
118
Q

Heating, Ventilation, Air Conditioning

Building control systems maintain an optimum heating, cooling, and humidity level working environment for different parts of the building.

A

HVAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
119
Q

Infrastructure as a Service

A computing method that uses the cloud to provide any or all infrastructure needs.

A

IaaS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
120
Q

Internet Control Message Protocol

IP-level protocol for reporting errors and status information supporting the function of troubleshooting utilities such as ping.

A

ICMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
121
Q

Industrial Control Systems

A network managing embedded devices (computer systems that are designed to perform a specific, dedicated function).

A

ICS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
122
Q

International Data Encryption Algorithm

A

IDEA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
123
Q

Intermediate Distribution Frame

A

IDF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
124
Q

Identity Provider

In a federated network, the service that holds the user account and performs authentication.

A

IdP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
125
Q

Intrusion Detection System

A software and/or hardware system that scans, audits, and monitors the security infrastructure for signs of attacks in progress.

A

IDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
126
Q

Institute of Electrical and Electronics Engineers

A standard for encapsulating EAP communications over a LAN (EAPoL) to implement port-based authentication.

A

IEEE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
127
Q

Internet Key Exchange

Framework for creating a Security Association (SA) used with IPSec. An SA establishes that two hosts trust one another (authenticate) and agree secure protocols and cipher suites to use to exchange data.

A

IKE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
128
Q

Instant Messaging

A

IM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
129
Q

Internet Message Access Protocol v4

TCP/IP application protocol providing a means for a client to access and manage email messages stored in a mailbox on a remote server. IMAP4 utilizes TCP port number 143

A

IMAPv4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
130
Q

Indicators of Compromise

A sign that an asset or network has been attacked or is currently under attack.

A

IoC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
131
Q

Internet of Things

Devices that can report state and configuration data and be remotely managed over IP networks.

A

IoT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
132
Q

Internet Protocol

A

IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
133
Q

Intrusion Prevention System

An IDS that can actively block attacks.

A

IPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
134
Q

Internet Protocol Security

A set of open, non-proprietary standards that are used to secure data through authentication and encryption as the data travels across the network or the Internet.

A

IPSec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
135
Q

Incident Response

Procedures and guidelines covering appropriate priorities, actions, and responsibilities in the event of security incidents, divided into preparation, detection/analysis, containment, eradication/recovery, and post-incident stages.

A

IR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
136
Q

Internet Relay Chat

A group communication protocol that enables user to chat, send private messages, and share files.

A

IRC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
137
Q

Incident Response Plan

Specific procedures that must be performed if a certain type of event is detected or reported.

A

IRP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
138
Q

International Organization for Standardization

A

ISO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
139
Q

Internet Service Provider

A

ISP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
140
Q

Information Systems Security Officer

Organizational role with technical responsibilities for implementation of security policies, frameworks, and controls.

A

ISSO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
141
Q

IT Contingency Plan

A

ITCP

142
Q

Initialization Vector

WEPs weakness is its 24-bit IV

A

IV

143
Q

Key Distribution Center

Component of Kerberos that authenticates users and issues tickets (tokens).

A

KDC

144
Q

Key Encryption Key

Component of Kerberos that authenticates users and issues tickets (tokens).

A

KEK

145
Q

Layer 2 Tunneling Protocol

VPN protocol for tunneling PPP sessions across a variety of network protocols such as IP, Frame Relay, or ATM.

A

L2TP

146
Q

Local Area Network

A

LAN

147
Q

Lightweight Directory Access Protocol

A network protocol used to access network directory databases, which store information about authorized users and their privileges, as well as other organizational information.

A

LDAP

148
Q

Lightweight Extensible Authentication Protocol

Cisco Systems’ proprietary EAP implementation.

A

LEAP

149
Q

Monitoring as a Service

A

MaaS

150
Q

Mandatory Access Control

Access control model where resources are protected by inflexible, system defined rules. REsources (objects) and users (subjects) are allocated a clearance level (or label).

A

MAC

151
Q

Mobile Application Management

Enterprise management function that enables control over apps and storage for mobile devices and other endpoints.

A

MAM

152
Q

Metropolitan Area Network

A

MAN

153
Q

Master Boot Record

A

MBR

154
Q

Message Digest 5

A cryptographic hash function producing a 128-bit output.

A

MD5

155
Q

Main Distribution Frame

A

MDF

156
Q

Mobile Device Management

The process and supporting technologies for tracking, controlling, and securing the organization’s mobile infrastructure.

A

MDM

157
Q

Multifactor Authentication

Authentication scheme that requires the user to present at least two different factors as credentials, from something you know, something you have, something you are, something you do, and somewhere you are. SPecifying two factors is knowns as 2FA.

A

MFA

158
Q

Multi-Function Device

Any device that performs more than one function, but typically print devices that can also scan and fax.

A

MFD

159
Q

Multi-Function Printer

Any device that performs more than one function, but typically print devices that can also scan and fax.

A

MFP

160
Q

Machine Learning

A component of AI that enable a machine to develop strategies for solving a task given a labeled data set where features have been manually identified but without further explicit instructions.

A

ML

161
Q

Multimedia Message Service

Extension to SMS allowing digital data (picture, video, or audio) to be sent over a cellular data connection.

A

MMS

162
Q

Memorandum of Agreement

A

MOA

163
Q

Memorandum of Understanding

Usually a preliminary or exploratory agreement to express an intent to work together that is no legally binding and does not involve the exchange of money.

A

MoU

164
Q

Multi-Protocol Label Switching

A

MPLS

165
Q

Measurement Systems Analysis

Evaluates the data collection and statistical methods used by quality management process to ensure they are robust.

A

MSA

166
Q

Microsoft Challenge Handshake Authentication Protocol

Implementation of CHAP created by Microsoft for use in its products.

A

MSCHAP

167
Q

Managed Service Provider

A

MSP

168
Q

Managed Security Service Provider

Third-party provision of security configuration and monitoring as an outsourced service.

A

MSSP

169
Q

Mean Time Between Failures

Rating a device or component that predicts the expected time between failures.

A

MTBF

170
Q

Mean Time to Failure

An average time a device or component is expected to be in operation.

A

MTTF

171
Q

Mean Time to Recover

Average time taken for a device or component to be repaired, replaced, or otherwise recover from a failure.

A

MTTR

172
Q

Maximum Transmission Unit

A

MTU

173
Q

Network Access Control

A general term for the collected protocols, policies, and hardware that authenticate and authorize access to a network at the device level.

A

NAC

174
Q

Network Attached Storage

A storage device with an embedded OS that supports typical network file access protocols (TCP/IP and SMB for instance).

A

NAS

175
Q

Network Address Translation

A routing mechanism that conceals internal addressing schemes from the public Internet by translating between a single public address on the external side of a router and private, non-routable addresses internally.

A

NAT

176
Q

Non-Disclosure Agreement

An agreement that stipulates that entities will not share confidential information, knowledge, or materials with unauthorized third parties.

A

NDA

177
Q

Near Field Communication

A standard for peer-to-peer (2-way) radio communication over very short (around 4”) distances, facilitating contactless payment and similar technologies, NFC is based on RFID.

A

NFC

178
Q

Network Functions Virtualization

Provisioning virtual network appliances, such as switches, routers, and firewalls, via VMs and containers.

A

NFV

179
Q

Network Interface Card

A

NIC

180
Q

Network Based Intrusion Detection System

A system that uses passive hardware sensors to monitor traffic on a specific segment of the network.

A

NIDS

181
Q

Network Based Intrusion Prevention System

An inline security device that monitors suspicious network and/or system traffic and reacts in real time to block it.

A

NIPS

182
Q

National Institute of Standards & Technology

Develops computer security standards used by US federal agencies and published cybersecurity best practice guides and research.

A

NIST

183
Q

New Technology File System

is the file system that the Windows NT operating system (OS) uses for storing and retrieving files on hard disk drives (HDDs) and solid-state drives (SSDs).

A

NTFS

184
Q

New Technology LAN Manager

A challenge-response authentication protocol created by Microsoft for use in its products.

A

NTLM

185
Q

Network Time Protocol

TCP/IP application protocol allowing machines to synchronize to the same time clock that runs over UDP port 123.

A

NTP

186
Q

Open Authorization

Standard for federated identity management, allowing resource server or consumer site to work with user accounts created and managed on a separate identity provider.

A

OAUTH

187
Q

Online Certificate Status Protocol

Allows clients to request the status of a digital certificate, to check whether it is revoked.

A

OCSP

188
Q

Object Identifier

A

OID

189
Q

Operating System

A

OS

190
Q

Open Systems Interconnection

Assigns network and hardware components and functions at seven discrete layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.

A

OSI

191
Q

Open Source Intelligence

Publicly available information plus the tools used to aggregate and search it.

A

OSINT

192
Q

Open Shortest Path First

A link-state routing protocol used on IP networks.

A

OSPF

193
Q

Operational Technology

A communications network designed to implement an industrial control system rather than data networking.

A

OT

194
Q

Over The Air

A firmware update delivered on a cellular data connection.

A

OTA

195
Q

On The Go

USB specification allow a mobile device to act as a host when a device such as an external drive or keyboard is attached.

A

OTG

196
Q

Open Vulnerability Assessment Language

A

OVAL

197
Q

Open Web Application Security Project

A charity and community publishing a number of secure application development resources.

A

OWASP

198
Q

PKCS #12

Format that allows a private key to be exported along with its digital certificate.

A

P12

199
Q

Peer to Peer

A

P2P

200
Q

Platform as a Service

A computing method that uses the cloud to provide any platform-type services.

A

PaaS

201
Q

Proxy Auto Configuration

A

PAC

202
Q

Privileged Access Management

Policies, procedures, and support software for managing accounts and credentials with administrative permissions.

A

PAM

203
Q

Pluggable Authentication Modules

Framework for implementing authentication providers in Linux.

A

PAM

204
Q

Password Authentication Protocol

Obsolete authentication mechanism used with PPP. PAP transfers the password in plaintext and so is vulnerable to eavesdropping.

A

PAP

205
Q

Port Address Translation

Maps private host IP addresses onto a single public IP address. Each host is tracked by assigning it a random high TCP port for communications. Also, referred to as network address port translation (NAPT) and as NAT overloading.

A

PAT

206
Q

Password Based Key Derivation Function 2

Implementation of key stretching to make potentially weak input used to derive a cryptographic key, such as short passwords, less susceptible to brute force attacks.

A

PBKDF2

207
Q

Private Branch Exchange

A

PBX

208
Q

Packet Capture

Standard format for recording packet captures to a file.

A

PCAP

209
Q

Payment Card Industry Data Security Standard

Information security standard for organizations that process credit or bank card payments.

A

PCI-DSS

210
Q

Power Distribution Unit

Advanced strip socket that provides filtered output voltage. A managed unit supports remote administration.

A

PDU

211
Q

Protected Extensible Authentication Protocol

EAP implementation that uses a server-side certificate to create a secure tunnel for user authentication, referred to as the inner method.

A

PEAP

212
Q

Personal Electronic Device

A

PED

213
Q

Privacy Enhanced Mail

Base64 encoding scheme used to store certificate and key data as ASCII text.

A

PEM

214
Q

Perfect Forward Secrecy

A characteristic of transport encryption that ensures if a key is compromised the compromise will only affect a single session and not facilitate recovery of plaintext data from other sessions.

A

PFS

215
Q

Pretty Good Privacy

A

PGP

216
Q

Personal Health Information

Information that identifies someone as the subject of medical and insurance records, plus associated hospital and laboratory test results.

A

PHI

217
Q

Personally Identifiable Information

Data that can be used to identify or contact an individual (or in the case of identity theft, to impersonate them).

A

PII

218
Q

Personal Identity Verification

A

PIV

219
Q

Public Key Cryptography Standards

Series of standards defining the use of certificate authorities and digital certificates.

A

PKCS

220
Q

Public Key Infrastructure

Framework of certificate authorities, digital certificates, software, services, and other cryptographic components deployed for the purpose of validating subject identities.

A

PKI

221
Q

Post Office Protocol

TCP port 110 protocol that enables a client to access email messages stored in a mailbox on a remote server. The server usually deletes messages once the client has downloaded them.

A

POP

222
Q

Plain Old Telephone Service

A

POTS

223
Q

Point-to-Point Protocol

Dial-up protocol working at layer 2 (Data Link) used to connect devices remotely to networks.

A

PPP

224
Q

Point-to-Point Tunneling Protocol

Developed by Cisco and Microsoft to support VPNs over PPP and TCP/IP. PPTP is highly vulnerable to password cracking attacks and considered obsolete.

A

PPTP

225
Q

Pre-Shared Key

Passphrase-based mechanism to allow group authentication to a wireless network. The passphrase is used to derive an encryption key.

A

PSK

226
Q

Pan-Tilt-Zoom

A class of surveillance camera that allows a remote operator to move the device and zoom the image.

A

PTZ

227
Q

Potentially Unwanted Program

Software that cannot definitively be classed as malicious, but may not have been chosen by or wanted by the user.

A

PUP

228
Q

Quality Assurance

Policies, procedures, and tools designed to ensure defect-free development and delivery.

A

QA

229
Q

Quality of Service

Systems that differentiate data passing over the network that can reserve bandwidth for particular applications. A system that cannot guarantee a level of available bandwidth is often described as Class of Service (CoS).

A

QoS

230
Q

Registration Authority

In PKI, an authority that accepts requests for digital certificates and authenticates the entities making those requests.

A

RA

231
Q

Rapid Application Development

A

RAD

232
Q

Remote Authentication Dial-in User Server

A standard protocol used to manage remote and wireless authentication infrastructures.

A

RADIUS

233
Q

Redundant Array of Inexpensive Disks

Specifications that support redundancy and fault tolerance for different configurations of multiple-device storage systems.

A

RAID

234
Q

Random Access Memory

A

RAM

235
Q

Remote Access Server

A

RAS

236
Q

Remote Access Trojan

Malware that creates a backdoor remote administration channel to allow a threat actor to access and control the infected host.

A

RAT

237
Q

Rivest Cipher version 4

A symmetric stream cipher generally considered obsolete, as it does not support large key sizes and is vulnerable to several attacks.

A

RC4

238
Q

Rich Communication Services

Platform-independent advanced messaging functionality designed to replace SMS and MMS.

A

RCS

239
Q

Request for Comments

A

RFC

240
Q

Radio Frequency Identifier

A means of encoding information into passive tags, which can be easily attached to devices, structures, clothing, or almost anything else.

A

RFID

241
Q

RACE Integrity Primitives Evaluation Message Digest

A

RIPEMD

242
Q

Return on Investment

A

ROI

243
Q

Recovery Point Objective

The longest period of time that an organization can tolerate lost data being unrecoverable.

A

RPO

244
Q

Rivest, Shamir, & Adleman

Named for its designers, Ronald Rivest, Adi Shamir, and Len Adelman, the first successful algorithm for public key encryption with a variable key length and block size.

A

RSA

245
Q

Remote Triggered Black Hole

A

RTBH

246
Q

Recovery Time Objective

The length of time it takes after an event to resume normal business operations and activities.

A

RTO

247
Q

Real-Time Operating System

A type of OS that prioritizes deterministic execution of operations to ensure consistent response for time-critical tasks.

A

RTOS

248
Q

Real-Time Transport Protocol

Opens a data stream for video and voice applications over UDP. The data is packetized and tagged with control information (sequence numbering and time-stamping).

A

RTP

249
Q

Secure/Multipurpose Internet Mail Extensions

An email encryption standard that adds digital signatures and public key cryptography to traditional MIME communications.

A

S/MIME

250
Q

Software as a Service

A computing method that uses the cloud to provide application services to users.

A

SaaS

251
Q

Simultaneous Authentication of Equals

Personal authentication mechanism for Wi-Fi networks introduced with WPA3 to address vulnerabilities in the WPA-PSK method.

A

SAE

252
Q

Security Assertions Markup Language

An XML-based data format used to exchange authentication information between a client and a service.

A

SAML

253
Q

System Control and Data Acquisition

A type of industrial control system that manages large-scale, multiple-site devices and equipment spread over geographically large areas.

A

SCADA

254
Q

Security Content Automation Protocol

A NIST framework that outlines various accepted practices for automating vulnerability scanning.

A

SCAP

255
Q

Simple Certificate Enrollment Protocol

A

SCEP

256
Q

Software Development Kit

Coding resources provided by a vendor to assist with development projects that use their platform or API.

A

SDK

257
Q

Software Development Life Cycle

The processes of planning, analysis, design, implementation, and maintenances that often govern software and systems development.

A

SDLC

258
Q

Software Development Life-cycle Methodology

A

SDLM

259
Q

Software Defined Networking

APIs and compatible hardware/virtual appliances allowing for programmable network appliances and systems.

A

SDN

260
Q

Software Defined Visibility

APIs for reporting configuration and state data for automated monitoring and alerting.

A

SDV

261
Q

Self-Encrypting Drives

A

SED

262
Q

Structured Exception Handler

A mechanism to account for unexpected error conditions that might arise during code execution. Effective error handling reduces the chances that a program could be exploited.

A

SEH

263
Q

Secured File Transfer Protocol

A secure version of the File Transfer Protocol that uses a Secure Shell (SSH) tunnel as an encryption method to transfer, access, and manage files.

A

SFTP

264
Q

Secure Hashing Algorithm

A cryptographic hashing algorithm created to address possible weaknesses in MDA. The current version is SHA-2.

A

SHA

265
Q

Secure Hypertext Transfer Protocol

HTTPS(ecure) provides for encrypted transfers, using SSL/TLS and port 443.

A

SHTTP

266
Q

Security Information and Event Management

A solution that provides real-time or near-real-time analysis of security alerts generated by network hardware and applications.

A

SIEM

267
Q

Subscriber Identity Module

A small chip card that identifies the user and phone number of a mobile device, via an International Mobile Subscriber Identity (ISMI).

A

SIM

268
Q

Session Initiation Protocol

Used to establish, disestablish, and manage VoIP and conferencing communications sessions. It handles user discovery (locating a user on the network), availability advertising (whether a user is prepared to receive calls), negotiating session parameters (such as use of audio/ video), and session management and termination.

A

SIP

269
Q

Service Level Agreement

Operating procedures and standards for a service contract.

A

SLA

270
Q

Single Loss Expectancy

The amount that would be lost in a single occurrence of a particular risk factor.

A

SLE

271
Q

Short Message Service

A

SMS

272
Q

Simple Mail Transfer Protocol

The protocol used to send mail between hosts on the Internet.
Messages are sent over TCP port 25.

A

SMTP

273
Q

Simple Mail Transfer Protocol Secure

A

SMTPS

274
Q

Simple Network Management Protocol

Protocol for monitoring and managing network devices. SNMP works over UDP ports 161 and 162 by default.

A

SNMP

275
Q

Simple Object Access Protocol

An XML-based web services protocol that is used to exchange messages.

A

SOAP

276
Q

Security Orchestration, Automation, Response

A class of security tools that facilitates incident response, threat hunting, and security configuration by orchestrating automated runbooks and delivering data enrichment.

A

SOAR

277
Q

System on Chip

A processor that integrates the platform functionality of multiple logical controllers onto a single chip.

A

SoC

278
Q

Security Operations Center

The location where security professionals monitor and protect critical information assets in an organization.

A

SOC

279
Q

Sender Policy Framework

A

SPF

280
Q

Spam over Internet Messaging

A spam attack that is propagated through instant messaging rather than email.

A

SPIM

281
Q

Structured Query Language

A programming and query language common to many largescale database systems.

A

SQL

282
Q

SQL Injection

An attack that injects a database query into the input data directed at a server by accessing the client side of the application.

A

SQLi

283
Q

Secure Real-Time Protocol

Version of RTP secured using TLS.

A

SRTP

284
Q

Solid State Drive

A

SSD

285
Q

Secure Shell

A remote administration and file-copy program that supports VPNs by using port forwarding, and that runs on TCP port 22.

A

SSH

286
Q

Secure Sockets Layer

A

SSL

287
Q

Single Sign On

An authentication technology that enables a user to authenticate once and receive authorizations for multiple services.

A

SSO

288
Q

Structured Threat Information eXchange

A framework for analyzing cybersecurity incidents.

A

STIX

289
Q

Shielded Twisted Pair

A

STP

290
Q

Secure Web Gateway

An appliance or proxy server that mediates client connections with the Internet by filtering spam and malware and enforcing access restrictions on types of sites visited, time spent, and bandwidth consumed.

A

SWG

291
Q

Terminal Access Controller Access Control System

An AAA protocol developed by Cisco that is often used to authenticate to administrator accounts for network appliance management.

A

TACACS+

292
Q

Trusted Automated eXchange of Indicator Information

A protocol for supplying codified information to automate incident detection and analysis.

A

TAXII

293
Q

Transmission Control Protocol/Internet Protocol

A

TCP/IP

294
Q

Ticket Granting Ticket

In Kerberos, a token issued to an authenticated account to allow access to authorized application servers.

A

TGT

295
Q

Temporal Key Integrity Protocol

A mechanism used in the first version of WPA to improve the security of wireless encryption mechanisms, compared to the flawed WEP standard.

A

TKIP

296
Q

Transport Layer Security

A security protocol that uses certificates for authentication and encryption to protect web communication.

A

TLS

297
Q

Time-based One Time Password

An improvement on HOTP that forces one-time passwords to expire after a short period of time.

A

TOTP

298
Q

Trusted Platform Module

A specification for hardware-based storage of digital certificates, keys, hashed passwords, and other user and platform identification information.

A

TPM

299
Q

Transaction Signature

A

TSIG

300
Q

Tactics, Techniques, and Procedures

Analysis of historical cyber-attacks and adversary actions.

A

TTP

301
Q

User Acceptance Testing

Usually one of the last stages in software development before release (beta testing), UAT proves that a program is usable and fit-for-purpose in real world conditions.

A

UAT

302
Q

User Datagram Protocol

A

UDP

303
Q

Unified Extensible Firmware Interface

A type of system firmware providing support for 64-bit CPU operation at boot, full GUI and mouse operation at boot, and better boot security.

A

UEFI

304
Q

Unified Endpoint Management

Enterprise software for controlling device settings, apps, and corporate data storage on all types of fixed, mobile, and IoT computing devices.

A

UEM

305
Q

Uninterruptible Power Supply

A battery-powered device that supplies AC power that an electronic device can use in the event of power failure.

A

UPS

306
Q

Uniform Resource Identifier

A

URI

307
Q

Universal Resource Locator

Application-level addressing scheme for TCP/IP, allowing for human-readable resource addressing.

For example: protocol://server/file, where “protocol” is the type of resource (HTTP, FTP), “server” is the name of the computer (www.microsoft.com), and “file” is the name of the resource you wish to access.

A

URL

308
Q

Universal Serial Bus

A

USB

309
Q

USB On The Go

USB specification allowing a mobile device to act as a host when a device such as an external drive or keyboard is attached.

A

USB OTG

310
Q

Unified Threat Management

All-in-one security appliances and agents that combine the functions of a firewall, malware scanner, intrusion detection, vulnerability scanner, data loss prevention, content filtering, and so on.

A

UTM

311
Q

Unshielded Twisted Pair

A

UTP

312
Q

Visual Basic

Programming languages used to implement macros and scripting in Office document automation.

A

VBA

313
Q

Virtual Desktop Environment

The user desktop and software applications provisioned as an instance under VDI.

A

VDE

314
Q

Virtual Desktop Infrastructure

A virtualization implementation that separates the personal computing environment from a user’s physical computer.

A

VDI

315
Q

Virtual Local Area Network

A logically separate network, created by using switching technology. Even though hosts on two VLANs may be physically connected to the same cabling, local traffic is isolated to each VLAN so they must use a router to communicate.

A

VLAN

316
Q

Variable Length Subnet Masking

A

VLSM

317
Q

Virtual Machine

A guest operating system installed on a host computer using virtualization software (a hypervisor), such as Microsoft Hyper-V or VMware.

A

VM

318
Q

Voice over IP

A generic name for protocols that carry voice traffic over data networks.

A

VoIP

319
Q

Virtual Private Cloud

A private network segment made available to a single cloud consumer on a public cloud.

A

VPC

320
Q

Virtual Private Network

A secure tunnel created between two endpoints connected via an unsecure network (typically the Internet).

A

VPN

321
Q

Video Teleconferencing

A

VTC

322
Q

Web Application Firewall

A firewall designed specifically to protect software running on web servers and their back-end databases from code injection and DoS attacks.

A

WAF

323
Q

Wireless Access Point

A

WAP

324
Q

Wired Equivalent Privacy

A legacy mechanism for encrypting data sent over a wireless connection.

A

WEP

325
Q

Wireless Intrusion Detection System

A

WIDS

326
Q

Wireless Intrusion Prevention System

A

WIPS

327
Q

Write Once Read Many

A

WORM

328
Q

WiFi Protected Access

Standards for authenticating and encrypting access to Wi-Fi networks. Versions include WPA2 and WPA3.

A

WPA

329
Q

WiFi Protected Setup

A feature of WPA and WPA2 that allows enrollment in a wireless network based on an 8-digit PIN.

A

WPS

330
Q

Anything as a Service

Expressing the concept that most types of IT requirements can be deployed as a cloud service model.

A

XaaS

331
Q

Extensible Markup Language

A system for structuring documents so that they are human- and machine-readable. Information within the document is placed within tags, which describe how information within the document is structured.

A

XML

332
Q

Exclusive Or

An operation that outputs to true only if one input is true and the other input is false.

A

XOR

333
Q

Cross-Site Request Forgery

A malicious script hosted on the attacker’s site that can exploit a session started on another site in the same browser. Also referred to as client-side request forgery (CSRF).

A

XSRF

334
Q

Cross-Site Scripting

A malicious script hosted on the attacker’s site or coded in a link injected onto a trusted site designed to compromise clients browsing the trusted site, circumventing the browser’s security model of trusted zones.

A

XSS

335
Q

An attack in which an attacker responds to a client requesting address assignment from a DHCP server.

A

DHCP Spoofing

336
Q

Active Directory

A

AD

337
Q

Basic Service Set Identifier

A

BSSID

338
Q
A

CSA

339
Q
A

CSIRT

340
Q

Extended Instruction Pointer

A

EIP

341
Q

Extended Service Set Identifier

A

ESSID

342
Q

File Integrity Monitoring

A

FIM

343
Q

Hardware Security Module as a Service

A

HSMaaS

344
Q

Identity and Access Management

A

IAM

345
Q

Next-generation Firewall

A

NGFW

346
Q

Next-generation Secure Web Gateway

A

NG-SWG

347
Q

Proof of Concept

A

PoC

348
Q

Service Set Identifier

A

SSID

349
Q

Service Delivery Platform

A

SDP

350
Q

User Datagram Protocol

A

UDP