Acronyms (Page 3) - Reverse Flashcards

1
Q

A type of authentication protocol used primarily to authenticate a user or network host to an authenticating entity.

A

CHAP

Challenge Handshake Authentication Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A model designed to guide policies for information security within an organization.

A

CIA

Confidentiality, Integrity, Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A job title commonly given to the most senior executive in an enterprise responsible for the information technology and computer systems that support enterprise goals.

A

CIO

Chief Information Officer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A service organization that is contacted when a security breach or other computer-related emergency occurs.

A

CIRT

Computer Incident Response Team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Software that helps users create, manage, and modify content on a website without the need for specialized technical knowledge.

A

CMS

Content Management System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A process by government agencies to ensure that critical functions continue during a wide range of emergencies, including localized acts of nature, accidents, and technological or attack-related emergencies.

A

COOP

Continuity of Operations Planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A business strategy for managing mobile devices that allows employees to use corporate-owned IT devices for personal use.

A

COPE

Corporate Owned, Personally Enabled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A course of action designed to help an organization respond effectively to a significant future event or situation that may or may not happen.

A

CP

Contingency Planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

An error-detecting code commonly used in digital networks and storage devices to detect accidental changes to raw data.

A

CRC

Cyclical Redundancy Check

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A list of digital certificates that have been revoked by the issuing certificate authority before their scheduled expiration date and should no longer be trusted.

A

CRL

Certificate Revocation List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A company executive responsible for the security of personnel, physical assets, and information in both physical and digital form.

A

CSO

Chief Security Officer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A company that offers some component of cloud computing - typically Infrastructure as a Service (IaaS), Software as a Service (SaaS) or Platform as a Service (PaaS) - to other businesses or individuals.

A

CSP

Cloud Service Provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A message sent from an applicant to a certificate authority in order to apply for a digital identity certificate.

A

CSR

Certificate Signing Request

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A type of malicious exploit of a website where unauthorized commands are transmitted from a user that the web application trusts.

A

CSRF

Cross-site Request Forgery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A device used in digital data transmission for interfacing a digital data terminal with a digital transmission medium.

A

CSU

Channel Service Unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A mode of operation in cryptography for block ciphers.

A

CTM

Counter Mode