Acronyms (Page 1) - Reverse Flashcards

1
Q

A framework for intelligently controlling access to computer resources, enforcing policies, auditing usage, and providing the information necessary to bill for services.

A

AAA

Authentication, Authorization, and Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A table that tells a computer operating system which access rights each user has to a particular system object, such as a file directory or individual file.

A

ACL

Access Control List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A symmetric encryption algorithm widely used across the globe to secure data.

A

AES

Advanced Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A version of the AES using a 256-bit key size for encryption, providing a higher level of security.

A

AES-256

Advanced Encryption Standard 256-bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A part of the IPsec protocol suite that provides authentication and integrity to the data.

A

AH

Authorization Header

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The simulation of human intelligence processes by machines, especially computer systems.

A

AI

Artificial Intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A system that allows the exchange of cyber threat indicators between the public and private sectors.

A

AIS

Automated Indicator Sharing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A risk management concept to estimate the monetary loss that can be expected for an asset due to a risk over a year.

A

ALE

Annualized Loss Expectancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A networking hardware device that allows other Wi-Fi devices to connect to a wired network.

A

AP

Access Point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A set of functions and procedures allowing the creation of applications that access the features or data of an operating system, application, or other services.

A

API

Application Programming Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A prolonged and targeted cyberattack in which an intruder gains access to a network and remains undetected for an extended period.

A

APT

Advanced Persistent Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The expected frequency with which a specific event is likely to occur annually.

A

ARO

Annualized Rate of Occurance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A communication protocol used for discovering the link layer address, such as a MAC address, associated with a given internet layer address, typically an IPv4 address.

A

ARP

Address Resolution Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A computer security technique involved in preventing exploitation of memory corruption vulnerabilities.

A

ASLR

Address Space Layout Randomization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A knowledge base maintained by MITRE for listing and explaining cyber adversary behavior.

A

ATT&CK

Adversarial Tactics, Techniques, and Common Knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly