B Flashcards

1
Q

BASH

A

Bourne again shell

Bash is a UNIX and Linux command interface and
language.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

BIA

A

Business Impact Analysis

This is the prerequisite for disaster recovery and
continuity planning to identify potential losses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

BIOS

A

Basic Input/Output System

The now deprecated initial program sets for computer.
Firmware based initialization code for booting a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Bluetooth

A

802.15

Technology commonly used to communicate with small
devices at modest speeds over a short range with low
security requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

BCP

A

Business Continuity Plan

The orderly planning for and management of threats and
incidents to an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

BGP

A

Border Gateway Protocol

Border Gateway Protocol is for routing exterior traffic
between autonomous systems/organizations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

BIA

A

Business Impact Analysis

Assessing the criticality of business activities and assets
in order to determine the appropriate protection and
recovery options.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

BO

A

Buffer overflow

The insertion of malicious computer instructions into
the RAM of a host to accomplish denial of service or
injecting shellcode.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

BPA

A

Business Partners Agreement

This outlines the goals and responsibilities between
entities pursuing a common work product.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

BPDU

A

Bridge Protocol Data Unit

This protocol is used to identify efficient paths and
loops in a switched network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

BSSID

A

Basic Service Set IDentifier

This is the MAC address that a wireless device is
attached to.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Brute Force

A

Brute force attack

Discovers a hash or encrypted secret by attempting all
combinations and permutations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

BYOD

A

Bring Your Own Device

The organization compensates the individual for use of
their phone in organizational activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly