C Flashcards

1
Q

CA

A

Certificate Authority

A company, device, or organization that issues digital certificates to verify the identity of people, companies, websites, and email addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

CAPTCHA

A

Completely Automated Public Turing Test to Tell Computers and Humans Apart

A type of challenge-response authentication that helps differentiate between real users and automated users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

CAR

A

Corrective Action Report

A document that details the steps taken to address and fix security gaps or non-conformities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

CASB

A

Cloud Access Security Broker

A security policy enforcement point between cloud service providers and enterprise users. It implements zero-trust access control and policy enforcement for cloud environments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

CBC

A

Cipher Block Chaining

A mode of operation for a block cipher that XORs the previous encrypted block of ciphertext to the next block of plaintext to be encrypted. The first encrypted block is an initialization vector that contains random data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

CCMP

A

Counter Mode/CBC-MAC Protocol

An encryption protocol based on AES and uses the Counter Mode with CBC-MAC (CCM) mode of operation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

CCTV

A

Closed-Circuit Television

A TV system in which signals are not publicly distributed, but are monitored, primarily for surveillance and security purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

CERT/CIRT

A

Computer Emergency Response Team
Computer Incident Response Team

A group of IT professionals who prepare for, respond to, and recover from cybersecurity incidents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

CFB

A

Cipher Feedback

An AES mode of operation. Unlike CBC, which directly encrypts plaintext blocks, this mode encrypts the previously encrypted plaintext block, then adds this to the next plaintext block. This means that the same algorithm used to encrypt the data can be used to decrypt it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

CHAP

A

Challenge Handshake Authentication Protocol

A secure authentication method that uses a challenge-response mechanism to verify a client’s identity to a server during an initial connection. It periodically re-authenticates the user during an online session.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

CIA

A

Confidentiality, Integrity, Availability

A cybersecurity framework that uses three principles to evaluate an organization’s security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

CIO

A

Chief Information Officer

The individual responsible for establishing, implementing, and ensuring compliance with cybersecurity policies. They are responsible for the effectiveness of cyber protections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

CMS

A

Content Management System

Software suites that allow users to create, manage, and publish digital content on the web. They allow site admins to easily manage the design, functionality, and operation of websites with minimal technical expertise. They store data, process transactions, and provide access to employees.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

COOP

A

Continuity of Operation Planning

A predetermined set of instructions or procedures that describe how an organization’s mission critical functions will be sustained during and after a disaster event.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

COPE

A

Corporate-Owned, Personally-Enabled

A policy that allows employees to use corporate-owned devices for both work and personal activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

CP

A

Contingency Plan

A course of action that helps an organization respond to a significant event or situation that may or may not happen in the future.

The same as a BCP.

17
Q

CRC

A

Cyclical Redundancy Check

A mathematical technique that detects errors in transmitted data in cybersecurity. A type of checksum algorithm.

18
Q

CRL

A

Certificate Revocation List

A list of digital certificates that have been revoked by a CA before their expiration date.

19
Q

CSO

A

Chief Security Officer

The individual responsible for managing an organization’s security, including (but not limited to) cybersecurity.

20
Q

CSP

A

Cloud Service Provider

A company that offers cloud computing services, such as storage, databases, and infrastructure.

21
Q

CSR

A

Certificate Signing Request

An encrypted message that contains information about an organization or person seeking a digital certificate

22
Q

CSRF

A

Cross-Site Request Forgery

A cyberattack that tricks a user into performing actions they don’t intend to on a trusted website.

Exploits the trust a web application has in an authenticated user.

23
Q

CSU

A

Channel Service Unit

A digital interface device that connects end user data communications equipment to digital access lines. It converts a digital data frame from the LAN into a frame appropriate to a WAN and vice versa.

24
Q

CTM

A

Counter Mode

An AES mode of operation that uses a counter function to generate a nonce value for each block’s encryption. That nonce number (the counter) gets encrypted and then XORed with the plaintext to generate ciphertext.

25
Q

CTO

A

Chief Technology Officer

The individual responsible for managing the physical and personnel technology infrastructure including technology deployment, network and system management, integration testing, and developing technical operations personnel. They are also responsible for the development of products and services.

26
Q

CVE

A

Common Vulnerability and Exposures

A standardized list of known security threats and vulnerabilities that helps security professionals share info about cyber threats. Created by MITRE.

27
Q

CVSS

A

Common Vulnerability Scoring System

A free, open industry standard that assesses the severity of security vulnerabilities in computer systems.

28
Q

CYOD

A

Choose Your Own Device

A hardware management model that allows employees to choose from a company-approved list of devices for work.