C Flashcards

1
Q

C2

A

Command and control

Servers that are centrally placed the hold control
instructions for illicitly managed hosts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

CA

A

Certificate Authority

This entity issues certificates. After verifying them, and
is the center of trust in PKI.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

CAC

A

Common Access Card

A form of identification with photograph, barcode,
RFID and cryptographic storage of private key
information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

CAPTCHA

A

Completely Automated Public Turing to Tell
Computers and Humans Apart

This is intended to prevent rogue automated attempts at
access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

CAR

A

Corrective Action Report

A document generated when the defect or error has been
detected that has the goal of eliminating a reoccurrence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

CASB

A

Cloud Access Security
Broker

A software resource place between users and cloud
applications that monitors and enforces policy-based
access to cloud resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

CBC

A

Cipher Block Chaining

Each plaintext block is XORed (see XOR) with the
immediately previous ciphertext block.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

CBT

A

Computer-Based Training

Courseware or lessons that are delivered via a computer,
commonly used for at home and corporate training.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

CCMP

A

Counter-Mode/CBC-Mac Protocol

Each plaintext block is XORed (see XOR) with the
immediately previous ciphertext block that includes a
message authentication code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

CCTV

A

Closed-circuit Television

Allows monitoring and recording of activities in an
area.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

CER

A

Cross-over Error Rate

The point at which false acceptances are equal to false
rejection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

CER

A

Certificate

A generic term for a document that facilitates
authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

CERT

A

Computer Emergency Response Team

A multi-discipline group designated to handle IT
incidents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

CFB

A

Cipher Feedback

A mode of operation for a block cipher.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Chain of custody

A

Evidence control and management

The documentation of handling and protection of
evidence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

CHAP

A

Challenge Handshake Authentication Protocol

Commonly used by routers and has several derivatives
in use by Microsoft for authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

CIO

A

Chief Information Officer

The most senior official in an organization responsible
for the information technology and systems that support
enterprise.

18
Q

CIRT

A

Computer Incident Response Team

A group that investigates and resolves IT security
problems.

19
Q

CIS

A

Center for Internet Security

Its mission is to identify develop, promote, and lead the
world with regard to best practices for cybersecurity
solutions.

20
Q

CMP

A

Change Management Policy

An organizational process designed to facilitate making
changes to organizational resources in such a way that
they are identifiable, auditable, and orderly.

21
Q

CMS

A

Content Management System

These are applications that facilitate the creation,
editing, publishing and archival of web pages and
content.

22
Q

CN

A

Common Name

An identifying name that may be applied to a directory
resource, such as a user, server, or other object.

23
Q

COOP

A

Continuity of Operations Plan

Ensuring that vital and primary mission essential
functions continue to run, even in the face of
emergencies.

24
Q

COPE

A

Corporate Owned, Personally Enabled

Smart phones owned by the organization, but approved
for personal use.

25
Q

CP

A

Contingency Planning

Procedures to follow in the event of a catastrophic
incident, even though it may be unlikely.

26
Q

CRC

A

Cyclical Redundancy Check

An error checking code, used in digital technology
primarily to identify accidental changes to data.

27
Q

Crimeware

A

Cyber theft

A class of malware that automates malicious activity.

28
Q

CRL

A

Certificate Revocation List

This is maintained by a certificate authority to identify
certificates associated with compromised or lost private
keys.

29
Q

CSO

A

Chief Security Officer

This official is responsible for development, oversight,
mitigation and other risk strategies.

30
Q

CSP

A

Cloud Service Provider

An organization that provides IaaS, PaaS or SaaS to an
array of customers.

An organization that provides cloud-based access to
infrastructure, storage and/or applications.

31
Q

CSA

A

Cloud Security Alliance

A nonprofit organization that promotes best practices in
security for cloud-based computing.

32
Q

CSIRT

A

Computer Security Incident Response Team

Information technology personnel whose purpose is to
prevent, manage and coordinate actions about security
incidents.

33
Q

CSR

A

Certificate Signing Request

Created by an applicant seeking to gain a certificate
from an authority.

34
Q

CSRF

A

Cross-site Request Forgery

An attack wherein a message is spoofed from a user to a
trusted site.

35
Q

CSU

A

Channel Service Unit

A connecting device used to link an organization to
telco-based T-services

36
Q

CTO

A

Chief Technology Officer

The executive person tasked with identifying useful
technology, IT strategies and partnerships.

37
Q

CTOS

A

Centralized terminal operating system.

Legacy management.

38
Q

CTR

A

Counter

This form of encryption is used by AES to perform
streaming encryption.

39
Q

CVE

A

Common Vulnerabilities and Exposures

A database of known and published software flaws that
may impact security that is managed by MITRE.

40
Q

CVSS

A

Common Vulnerability Scoring System

An empirical scheme for rating vulnerability severity
based upon specific aspects of the vulnerability,
environment, and nature of threats.

41
Q

CYOD

A

Choose Your Own Device

In this mode of control and acquisition, an employee
chooses a device from a company provided list.
Ownership may be personal or organization.