Acronyms (Security) Flashcards

1
Q

AIS

A

Automated Indicator Sharing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ASLR

A

Address Space Layout Randomization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ATT&CK

A

Adversarial Tactics, Techniques, and Common Knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

AV

A

Antivirus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

AAA

A

Authentication, Authorization, and Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

CAPTCHA

A

Completely Automated Public Turing Test to Tell Computers and Humans Apart

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

CASB

A

Cloud Access Security Broker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

CIA

A

Confidentiality, Integrity, Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

CVE

A

Common Vulnerability Enumeration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

CVSS

A

Common Vulnerability Scoring System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

DAC

A

Discretionary Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

DLP

A

Data Loss Prevention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

EDR

A

Endpoint Detection and Response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

FACL

A

File System Access Control List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ACL

A

Access Control List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

FIM

A

File Integrity Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

GPO

A

Group Policy Object

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

HA

A

High Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

HIDS

A

Host-based Intrusion Detection System

20
Q

HIPS

A

Host-based Intrusion Prevention System

21
Q

HOTP

A

HMAC-based One-time Password

22
Q

IDS

A

Intrusion Detection System

23
Q

IoC

A

Indicators of Compromise

24
Q

NAC

A

Network access control

25
Q

MAC

Access control

A

Mandatory Access Control

26
Q

NIDS

A

Network-based Intrusion Detection System

27
Q

NIPS

A

Network-based Intrusion Prevention System

28
Q

OSINT

A

Open-source Intelligence

29
Q

OVAL

A

Open Vulnerability Assessment Language

30
Q

PAM

A

Privileged Access Management

31
Q

PCAP

A

Packet Capture

32
Q

RBAC

Not rule

A

Role-based Access Control

33
Q

RBAC

Not role

A

Rule-based Access Control

34
Q

SE Linux

A

Security-enhanced Linux

35
Q

SIEM

A

Security Information and Event Management

36
Q

SPIM

A

Spam over Internet Messaging

37
Q

STIX

A

Structured Threat Information eXchange

38
Q

TAXII

A

Trusted Automated eXchange of Indicator Information

39
Q

TOTP

A

Time-based One-time Password

40
Q

TTP

A

Tactics, Techniques, and Procedures

41
Q

UEM

A

Unified Endpoint Management

42
Q

UTM

A

Unified Threat Management

43
Q

WIDS

A

Wireless Intrusion Detection System

44
Q

WIPS

A

Wireless Intrusion Prevention System

45
Q

XDR

A

Extended Detection and Response