Acronyms (Page 2) - Reverse Flashcards

1
Q

A policy that sets out the rules and guidelines for the proper use of an organization’s information technology.

A

AUP

Acceptable Use Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Software designed to detect and destroy computer viruses.

A

AV

Antivirus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A Unix shell and command language.

A

BASH

Bourne Again Shell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The process involved in creating a system of prevention and recovery from potential threats to a company.

A

BCP

Business Continuity Planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The protocol used to route information across the internet.

A

BGP

Border Gateway Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A process that identifies and evaluates the potential effects of natural and man-made events on business operations.

A

BIA

Business Impact Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Firmware used to perform hardware initialization during the booting process and to provide runtime services for operating systems and programs.

A

BIOS

Basic Input/Output System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A contract between parties who have agreed to share resources to undertake a specific, mutually beneficial project.

A

BPA

Business Partners Agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A type of network message that is transmitted by a local area network (LAN) bridge.

A

BPDU

Bridge Protocol Data Unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A policy that allows employees to bring personally owned devices to their workplace and use those devices to access company information and applications.

A

BYOD

Bring Your Own Device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

An entity that issues digital certificates for use by other parties.

A

CA

Certificate Authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A type of challenge-response test used in computing to determine whether the user is human.

A

CAPTCHA

Completely Automated Public Turing Test to Tell Computers and Humans Apart

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A report that outlines the corrective actions necessary to rectify a detected non-conformance.

A

CAR

Corrective Action Report

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

On-premises or cloud-based security policy enforcement points placed between cloud service consumers and cloud service providers.

A

CASB

Cloud Access Security Broker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A mode of operation for a block cipher that provides confidentiality but not message integrity.

A

CBC

Cipher Block Chaining

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

An encryption protocol used in Wi-Fi networks.

A

CCMP

Counter Mode/CBC-MAC Protocol

17
Q

A TV system in which signals are not publicly distributed but are monitored, primarily for surveillance and security purposes.

A

CCTV

Closed-circuit Television

18
Q

An expert group that handles computer security incidents.

A

CERT

Computer Emergency Response Team

19
Q

A mode of operation for a block cipher.

A

CFB

Cipher Feedback