C Flashcards

1
Q

CAM Table

A

Maps MAC addresses to IP address, allowing a switch to send traffic to the correct port.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Capture The Flag

A

An exercise that pits technologists against one another in an attempt to attack a system and achieve a specific goal, such as stealing a sensitive file. 8

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Card Cloning Attack

A

A kind of attack that focuses on capturing information from cards like RFID and magstripe cards often used for entry access. 8

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Carrier unlocking

A

Allows mobile phones to be used with other cellular providers. 8

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

CCMP (Counter Mode With Cipher Block Chaining Message Authentication Code Protocol)

A

Encryption technology used in the WPA2 protocol. It implements AES (Advanced Encryption Standard) with a 128- bit key as a stream cipher. 8

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Cellular

A

A kind of wireless connection that provides connectivity for mobile devices like cell phones by dividing geographic areas into “cells”, with tower coverage allowing wireless communications between devices and towers or cell sites. 8

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Center For Internet Security (CIS)

A

An industry organization that publishes hundreds of benchmarks for commonly used platforms. 8

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Centralized

A

Centralized approach to commuting places a significant portion of an organization’s infrastructure within a Single environment. 8

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Centralized Proxy

A

Traffic is routed through the device. 9

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Certificate

A

Certificates can be stored on a system or paired with a storage device or security token and are often used to identify systems or devices as well as individuals. 9

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Certificate Authorities (CA)

A

CA are the glue that binds the public key infrastructure together. These neutral organizations offer notarization services for digital certificates. 9

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Certificate Chaining

A

The use of a series of intermediate CAs in the certificate authority trust model. 9

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Certificate Revocation List (CRL)

A

Used to ensure that the certificate was not revoked. 9

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Certificate Signing Request (CSR)

A

Provides your public key to the certificate authority to create an X.509 digital certificate containing your identifying information and a copy of your public key. The CA then digitally signs the certificate using the CA’s private key and provides you with a copy of your signed digital certificate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Certificate Stapling

A

This is an extension to the Online Certificate Status Protocol (OCSP) that relieves some of the burden placed upon certificate authorities by the original protocol. The web server contacts the OCSP server itself and receives a signed and timestamped response from the OCSP server, which it then attaches to the digital certificate. 9

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Certification

A

The comprehensive evaluation, made in support of the accreditation process, of the technical and nontechnical security features of an IT system and other safeguards to establish the extent to which a particular design and implementation meets a set of specified security requirements.9

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Chain of Custody

A

The process by which investigators document the handling of evidence from collection through use in court. 9

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Challenge Handshake Authentication Protocol (CHAP)

A

A protocol that challenges a user or system to verify its identity without sending a secrete key over the network. 9

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Change Management

A

Process that defines how the organization will review, approve, and implement proposed changes to information systems in a manner that manages both Cybersecurity and operational risk.9

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Choose Your Own Device (CYOD)

A

The organization owns the device but allows the user to select and maintain it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Chosen Plain Text

A

The attacker obtains the ciphertexts corresponding to a set of plain texts of their own choosing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

CIA Triad

A

The 3 essential security principles of confidentiality, integrity, and availability. 9

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Cipher

A

A system that hides the true meaning of a message. Ciphers use a variety of techniques to alter and/or rearrange the characters or words of a message to achieve confidentiality. 9

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Clean Desk Policy

A

A policy used to instruct workers how and why to clean off their desks at the end of each work period. In relation to security, such a policy has a primary goal of reducing disclosure of sensitive information. 10

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Closed Circuit Television (CCTV)

A

Displays what the camera is seeing on a screen. Some CCTV systems include recording capabilities as well. 10

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Closed Sourc Intelligence

A

Intelligence information, typically from a commercial vendor that is provided only to specific groups. 10

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Cloud Access Security Broker (CASB)

A

A security policy enforcement solution that consistently enforces security policies across cloud providers. 10

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Cloud Auditors

A

Independent organizations that provide third-party assessments of cloud services and operations. 10

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Cloud Bursting

A

Moving the execution of an application to the cloud on an as-needed basis. 10

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Cloud Carriers

A

The intermediaries that provide the connectivity that allows the delivery of cloud services from providers to consumers. 10

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Cloud Computing

A

A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources. 10

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Cloud Consumers

A

The organizations and individuals who purchase cloud services from cloud service providers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Cloud Partners

A

The organizations that offer ancillary products or services that support or integrate with the offerings of a cloud service provider. 10

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Cloud Service Providers

A

The firms that offer cloud computing services to their customers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Clustering

A

Describes groups of computers connected together to perform the same task.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Code Injection Attacks

A

Attacks seeking to insert attacker-written code into the legitimate code created by web application developer. 10

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Code of Conduct/Ethics

A

A document that describes expected behavior of employees and affiliates and covers situations not specifically addressed in policy.10

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Code Repositories

A

Centralized locations for the storage and management of application source code. 10

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Code Review

A

A form of vulnerability assessment where flaws in code or errors in logic are detected by combing through source code. 10

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Code Signing

A

A way for developers to confirm the authenticity of their code to end users.10

41
Q

Code Aisles

A

Server room aisles that blow cold air from the floor.11

42
Q

Cold Sites

A

Standby facilities large enough to handle the processing load of an organization and with appropriate electrical and environmental support systems. 11

43
Q

Collisions

A

Cases where a hash function produces the same value for two different methods. 11

44
Q

Column Level Encryption (CLE)

A

Allows for specific columns within tables

45
Q

Common Configuration Enumeration (CCE)

A

Provides a standard nomenclature for discussing configuration issues. 11

46
Q

Common Name

A

Clearly describes the certificate owner.

47
Q

Common Platform enumeration (CPE)

A

Provides a standard nomenclature for describing security related software flaws. 11

48
Q

Common Vulnerabilities and Exposure (CVE)

A

Common Vulnerabilities and Exposure (CVE) Provides a standard nomenclature for describing security related software flaws. 11

49
Q

Common Vulnerability Scoring System (CVSS)

A

Common Vulnerability Scoring System (CVSS) – Security Content Automation Protocol (SCAP) Component that provides a standardized scoring system for describing the characteristics and severity of security vulnerabilities. 11

50
Q

Community Cloud

A

Cloud delivery model in which the infrastructure is shared by organizations with something in common. 11

51
Q

Company Owned Business ONLY (COBO)

A

Company Owned Business ONLY (COBO) – Most frequently used to describe company owned devices used only for business work. 11

52
Q

Compensating Controls

A

Gap controls that fill in the coverage between other types of vulnerability mitigation techniques. 11

53
Q

Compliance Reporting

A

Ensures that organizations meet the regulatory requirements and maintain transparency within the organization and with external stakeholders. 11

54
Q

Compliance Risk

A

The risk that a security breach causes an organization to run afoul of legal or regulatory requirements. 11

55
Q

Computer Based Training (CBT)

A

Computer Based Training (CBT)- method of Delivery training content to users by digital means.

56
Q

Concurrent Session Usage

A

An indicator of compromise that occurs when a session is used from more than one location or device at a time. 11

57
Q

Confidential

A

Information that requires some protection. 11

58
Q

Confidentiality

A

Ensures that unauthorized individuals are not able to gain access to sensitive information. 11

59
Q

Confidentiality Metric (C)

A

Confidentiality Metric – A metric that describes the type of information disclosure that might occur if an attacker successfully exploits the vulnerability. 12

60
Q

Configuration Management

A

The Process of logging, auditing, and monitoring activities related to security controls and security mechanisms over time. This data is then used to identify agents of change, such as object, subjects, programs, communication pathways, or even the network itself. 12

61
Q

Conflicts of interest

A

Arises when a vendor has a competing interest that could influence their behavior in a way that is not aligned with the best interest of the organization. 12

62
Q

Conservative Risk Appetite

A

Organizations tend to avoid high risk and focus on maintaining stability and protecting existing assets. 12

63
Q

Container

A

Standardized software packages that include all code and libraries to facilitate execution on any hardware and operating system supporting the same containerization platform. 12

64
Q

Containerization

A

This is an increasingly common solution to handling separation of work and personal use contexts on devices. 12

65
Q

Containment

A

Prevention of the spread of malicious code or other attacks.

66
Q

Content filters

A

Devices or software that allow or block traffic based on content rules. 12

67
Q

Content Aware authentication

A

Goes beyond PINs, passwords, and biometrics to better reflect user behavior. 12

68
Q

Continuity of Operations

A

Ensuring that operations will continue even if issues ranging from single system failures to wide scale natural disasters occur. 12

69
Q

Continuous Delivery (CD)

A

Continuous Delivery (CD) – Sometimes called continuous delivery; it rolls out tested changes into production automatically as soon as they have been tested. 12

70
Q

Continuous Integration (CI)

A

Continuous Integration (CI)– A development practice that checks code into a shared repository on a consistent, ongoing basis.

71
Q

Continuous Monitoring

A

A monitoring practice that uses automation to facilitate 24/7 monitoring of systems and networks. 12

72
Q

Continuous Risk Assessment

A

Involves ongoing monitoring and analysis of risks. 12

73
Q

Continuous Validation

A

Using continuous integration and continuous deployment methods requires building continuous validation and automated Secuity testing into the pipeline testing process. 12

74
Q

Control Objectives

A

The requirements of the level of protection required to preserve the confidentiality, integrity, and availability of an organization’s information and systems. 13

75
Q

Control Objectives for Information and Related Technologies (COBIT)

A

Control Objectives for Information and Related Technologies (COBIT)– Describes the common requirements that organizations should have in place surrounding their information systems. 13

76
Q

Cookie

A

A plain-text file stored on your machine that contains information about you (and your preferences) for use by a database server. Although cookies are frequently used for various legitimate purposes, they can also be used by malicious websites to track user activities. 13

77
Q

Corporate-Owned

A

Provides the greatest control but least flexibility for devices.

78
Q

Corporate-Owned, personally Enabled (COPE)

A

Corporate-Owned, personally Enabled (COPE)– Corporate provided devices that allow reasonable personal use while meeting enterprise security and control needs. 13

79
Q

Corrective Controls

A

A type of access control that modifies the environment to return systems to normal after an unwanted or unauthorized activity has occurred. 13

80
Q

Credential Harvesting

A

The process of gathering credentials like usernames and passwords.

81
Q

Credential Management Policy

A

A document that describes the account life cycle from provisioning through active use and decommissioning. 13

82
Q

Credential Reply

A

Attacks are form of network attack that requires the attacker to be able to capture valid network data and to re-send it or to delay it so that the attacker’s own use of the data is successful. 13

83
Q

Credentialed Scanning

A

Access operating systems, databases, and applications, among other sources. 13

84
Q

Cross Site Request Forgery (XSRF/CSRF)

A

Cross Site Request Forgery (XSRF/CSRF) An attack that is similar in nature to that of XSS. However, with XSRF, the attack is focused on the visiting user’s web browser more so than the website being visited. 13

85
Q

Cross-Site Scripting (XSS)

A

Cross-Site Scripting (XSS)–Running a script routine on a user’s machine from a website without their permission. 13

86
Q

Crossover Error Rate (CER)

A

Crossover Error Rate (CER)–The point at which the false rejection rate (FRR) and the false acceptance rate (FAR) are equal. Sometimes called equal error rate (ERR)

87
Q

Cryptanalysis

A

The study of methods to defeat codes and ciphers. 13

88
Q

Cryptocurrency

A

The first major application of the blockchain. Blockchain allows the existence of a currency that has no central regulator. 13

89
Q

Cryptography

A

Algorithms applied to data that are designed to ensure confidentiality, integrity, authentication, and/or nonrepudiation. The art of creating and implementing secret codes and ciphers. 14

90
Q

Cryptology

A

Together, cryptography and cryptanalysis are commonly referred to as cryptology. 14

91
Q

Cryptosystems

A

Specific implementations of a code or cipher in hardware and software. 14

92
Q

Cryptovariables

A

Cryptographic keys

93
Q

Curl

A

A tool that is found on linux systems and that is used to transfer data via URLs.

94
Q

CVSS base score

A

A single number representing the overall risk posed by the vulnerability. 14

95
Q

CVSS Vector

A

A vector that uses a single line format to convey the ratings of a vulnerability on all 6 of the metrics. 14

96
Q

Cyber kill chain

A

A seven-step process of mapping attacks from their beginning to end. 14

97
Q

Cybersecurity Framework CSF

A

– NIST cybersecurity framework provides organization against cybersecurity risks.

98
Q

Cybersecurity Insurance

A

Insurance policy designed to protect an organization against cybersecurity risks. 14

99
Q

CYOD

A

Choose Your Own Device