Acronyms (Page 2) Flashcards

1
Q

AUP

A

Acceptable Use Policy

A policy that sets out the rules and guidelines for the proper use of an organization’s information technology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

AV

A

Antivirus

Software designed to detect and destroy computer viruses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

BASH

A

Bourne Again Shell

A Unix shell and command language.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

BCP

A

Business Continuity Planning

The process involved in creating a system of prevention and recovery from potential threats to a company.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

BGP

A

Border Gateway Protocol

The protocol used to route information across the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

BIA

A

Business Impact Analysis

A process that identifies and evaluates the potential effects of natural and man-made events on business operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

BIOS

A

Basic Input/Output System

Firmware used to perform hardware initialization during the booting process and to provide runtime services for operating systems and programs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

BPA

A

Business Partners Agreement

A contract between parties who have agreed to share resources to undertake a specific, mutually beneficial project.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

BPDU

A

Bridge Protocol Data Unit

A type of network message that is transmitted by a local area network (LAN) bridge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

BYOD

A

Bring Your Own Device

A policy that allows employees to bring personally owned devices to their workplace and use those devices to access company information and applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

CA

A

Certificate Authority

An entity that issues digital certificates for use by other parties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

CAPTCHA

A

Completely Automated Public Turing Test to Tell Computers and Humans Apart

A type of challenge-response test used in computing to determine whether the user is human.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

CAR

A

Corrective Action Report

A report that outlines the corrective actions necessary to rectify a detected non-conformance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

CASB

A

Cloud Access Security Broker

On-premises or cloud-based security policy enforcement points placed between cloud service consumers and cloud service providers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

CBC

A

Cipher Block Chaining

A mode of operation for a block cipher that provides confidentiality but not message integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

CCMP

A

Counter Mode/CBC-MAC Protocol

An encryption protocol used in Wi-Fi networks.

17
Q

CCTV

A

Closed-circuit Television

A TV system in which signals are not publicly distributed but are monitored, primarily for surveillance and security purposes.

18
Q

CERT

A

Computer Emergency Response Team

An expert group that handles computer security incidents.

19
Q

CFB

A

Cipher Feedback

A mode of operation for a block cipher.