Acronyms (Page 4) - Reverse Flashcards

1
Q

An executive-level position in a company or other entity whose occupant is focused on scientific and technological issues within an organization.

A

CTO

Chief Technology Officer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A list of publicly disclosed cybersecurity vulnerabilities.

A

CVE

Common Vulnerability Enumeration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A free and open industry standard for assessing the severity of a computer system security vulnerabilities.

A

CVSS

Common Vulnerability Scoring System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A corporate policy that permits employees to choose which devices they use for work purposes.

A

CYOD

Choose Your Own Device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A type of access control defined by the Access Control List (ACL) where access rights are assigned to users by the system (or system’s administrators).

A

DAC

Discretionary Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A person who uses specialized software to store and organize data.

A

DBA

Database Administrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A type of cyber-attack where multiple compromised computer systems attach a target, such as a server, website, or other network resource, and cause a denial of service for users of the targeted resource.

A

DDoS

Distributed Denial of Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A security feature that can help prevent damage to your computer from viruses and other security threats.

A

DEP

Data Execution Prevention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A previously dominant algorithm for the encryption of electronic data.

A

DES

Digital Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A network management protocol used on IP networks whereby a server dynamically assigns an IP address and other network configuration parameters to each device on a network.

A

DHCP

Dynamic Host Configuration Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A method of securely exchanging cryptographic keys over a public channel.

A

DHE

Diffie-Hellman Ephemeral

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

An email authentication method designed to detect forged sender addresses in emails.

A

DKIM

DomainKeys Identified Mail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A set of tools and processes used to ensure that sensitive data is not lost, misused, or accessed by unauthorized users.

A

DLP

Data Loss Prevention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A feature of Windows and other operating systems that allows multiple software programs to share the same functionality.

A

DLL

Dynamic Link Library

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

An email authentication protocol designed to give email domain owners the ability to protect their domain from unauthorized use, commonly known as email spoofing.

A

DMARC

Domain Message Authentication Reporting and Conformance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A technique for transparently changing the destination IP address of an end route packet and performing the inverse function for any replies.

A

DNAT

Destination Network Address Translation

17
Q

The phonebook of the Internet, a hierarchical and decentralized naming system for computers, services, or other resources connected to the Internet or a private network.

A

DNS

Domain Name System