Acronyms Flashcards

1
Q

FIM

A

file integrity monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ARO

A

Annual Rate Occurence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

CSR

A

Certificate Signing Request

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

CRC

A

Cycle Redundancy Check

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

BIOS

A

Basic Input Output System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

CVSS

A

Common Vulnerability Scoring System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

IaC

A

Infrastructure as Code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

DLP

A

Data Loss Prevention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

GPO

A

Group Policy Object

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

ARO

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

RTO

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

RPO

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

ALE

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

SLE

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

COMMAND AND CONTROL (C2) SERVER

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

DDoS

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

DHCP

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

COMMON VULNERABILITIES AND EXPOSURES (CVEs)

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

CVSS

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

CIRT

A

Computer Incident Response Team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

CIA

A

confidentiality, integrity, availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

SIEM

A

Security information and event management, SIEM for short, is a solution that helps organizations detect, analyze, and respond to security threats before they harm business operations.

SIEM, pronounced “sim,” combines both security information management (SIM) and security event management (SEM) into one security management system. SIEM technology collects event log data from a range of sources, identifies activity that deviates from the norm with real-time analysis, and takes appropriate action.

In short, SIEM gives organizations visibility into activity within their network so they can respond swiftly to potential cyberattacks and meet compliance requirements.

In the past decade, SIEM technology has evolved to make threat detection and incident response smarter and faster with artificial intelligence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
25
26
27
28
28
29
30
30
31
32
33
34
35
36
37
38
38
39
39
39
39
40
40
41
42
43
# *
44
45
45
46
47
48
48
49
# [](http://)
50
50
50
51
51
52
53
54
55
56
57
58
59
60
61
62
62
62
62
63
64
65
66
67
67
68
68
69
70
70
71
72
72
73
73
74
75
75
76
76
76