COMP TIA Acronyms 1 Flashcards

1
Q

Is the type of cryptography where block cipher algorithms are applied three times to each data block. The key size increased in Triple-DES to ensure additional security through encryption capabilities

A

Triple Data Encryption Standard (3DES)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A framework for intelligently controlling access to computer resources, enforcing policies, auditing usage, and providing the information necessary to bill for services

A

Authentication, Authorization, and Accounting (AAA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An authorization methodology that sets and enforces policies based on characteristics, such as department, location, manager, and time of day

A

Attribute Based Access Control (ABAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Made up of rules that either allow access to a computer environment or deny it. In a way, an ACL is like a guest list at an exclusive club

A

Access Control (ACL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Is a database and set of services that connect users with the network resources they need to get their work done. The database (or directory) contains critical information about your environment, including what users and computers there are who’s allowed to do what

A

Active Directory (AD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Is the specification for the encryption of electronic data established by the U.S. National Institute of Standards and Technology (NIST)

A

Advanced Encryption Standard (AES)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Verifies origin of data and also payload to confirm if there has been modification done in between during transmission between source and destination

A

Authentication Header (AH)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Is a service the Cybersecurity and Infrastructure Security Agency (CISA) provides to enable real-time exchange of machine-readable cyber threat indicators and defensive measures between public and private sector organizations

A

Automated Indicator Sharing (AIS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Is the product of the annual rate of occurrence (ARO) and the single loss expectancy (SLE). It is expressed as ALE=ARO X SLE

A

Annualized Loss Expectancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A stand alone device or computer that allows wireless devices (such as laptop computers) to connect to and communicate with a wired computer network

A

Access Point (AP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Mechanism that enable two software components to communicate with each other using a set of definitions and protocols.

A

Application Programming Interface (API)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A prolonged and targeted cyber attack in which an intruder gains access to a network and remains undetected for an extended period

A

Advanced Persistent Threat (APT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The probability that a risk will occur in a particular year

A

Annualized Rate of Occurrence (ARO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Is a protocol or procedure that connects an ever-changing Internet Protocol (IP) address to a fixed physical machine address, also known as a media access control (MAC) address, in a local area network (LAN)

A

Address Resolution Protocol (ARP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A technique that is used to increase the difficulty of performing a buffer overflow attack that requires the attacker to know the location of an executable in memory

A

Address Space Layout Randomization (ASP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Enables web servers to dynamically generate webpages and create interactive web applications by using server-side scripting technology. The use of ASP pages with Microsoft Internet Information Services (IIS) is currently supported in all supported version

A

Active Server Pages (ASP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Is a guideline for classifying and describing cyberattacks and intrusions. It was created by the Mitre Corporation and released in 2013

A

Adversarial Tactics, Techniques and Common Knowledge (ATT&CK)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A document stipulating constraints and practices that a user must agree to for access to a corporate network, the internet or other resources

A

Acceptable Use Policy (AUP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Designed to detect and destroy computer viruses

A

Antivirus (AV)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Is a Unix shell and command language used for scripting. It provides command-based programming to interpret and execute user commands

A

Bourne Again Shell (BASH)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Created to help speed up the recovery of an organization filing a threat or disaster. The plan puts in place mechanisms and functions to allow personnel and assets to minimize company downtime

A

Business Continuity Planning (BCP)

22
Q

A set of rules that determine the best network routes for data transmission on the internet. The internet consists of private, public, corporate, and government networks linked together through standardized protocols, devices and communication technologies

A

Border Gateway Protocol (BGP)

23
Q

Is a systematic process to determine and evaluate the potential effects of an interruption to critical business operations as a result of a disaster, accident or emergency

A

Business Impact Analysis (BIA)

24
Q

A program fixed and embedded on a device’s microprocessor that helps to initialize hardware operations and manage the data flow to and from the operating system (OS) at the time of bootup

A

Basic Input/Output System (BIOS)

25
Q

The message that are transmitted across LAN networks to enable switches to participate in Spanning Tree Protocol (STP) by gathering information about each other

A

Bridge Protocol Data Unit (BPDU)

26
Q

The trend of employees using personal devices to connect to their organizational networks and access work-related systems and potentially sensitive or confidential data

A

Bring Your Own Device (BYOD)

27
Q

Is a trusted entity that issues Secure Sockets Layer (SSL) certificates. These digital certificates are data files used to cryptographically link an entity with a public key

A

Certificate Authority (CA)

28
Q

Test designed to determine if an online user is really a human and not a bot

A

Completely Automated Public Turing Test to Tell Computers and Humans Apart (CAPTCHA)

29
Q

Is basically an official document issued when an element of a plan hasn’t been implemented or executed properly. When any changes need to be made in the process, a corrective action report has to be prepared so that procedures are updates for future use

A

Corrective Action Report (CAR)

30
Q

Are on-premises, or cloud-based security policy enforcement points, placed between cloud service consumers and cloud service providers to combine and interject enterprise security policies as the cloud-based resources are accessed

A

Cloud Access Security Broker

31
Q

Is a mode of operation for a block-cipher, one in which a sequence of bits are encrypted as a single unit, or block, with a cipher key applied to the entire block

A

Cipher Block Chaining (CBC)

32
Q

Is any course of instruction whose primary means of delivery is a computer

A

Computer Based Training (CBT)

33
Q

An encryption protocol based on the U.S. Federal government’s Advanced Encryption Standard (AES) algorithm and uses the Counter Mode with CBD-MAC (CCM) mode of operation

A

Counter-Mode/CBC-MAC Protocol (CCMP)

34
Q

Is a group formed in 1998 by the U.S. Defense Advanced Research Projects Agency-and coordinated through Carnegie Mellon

A

Computer Emergency Response Team (CERT)

35
Q

Is an AES block cipher mode similar to the CBC mode in the sense that for the encryption of a block, Bi, the cipher of the previous block, Ci-1 is required

A

Cipher Feedback (CFB)

36
Q

Is an identity checking protocol that periodically re-authenticates the user during an online session. Properly implemented CHAP is replay attack resistant, and far more secure than the Password Authentication Protocol (PAP)

A

Challenge-Handshake Authentication Protocol (CHAP)

37
Q

Managing and successfully implementing the information and computer technology systems of a company

A

Chief Information Officer (CIO)

38
Q

Group of individuals usually consisting of Security Analysts organized to develop, recommend and coordinate immediate mitigation actions for containment, eradication, and recovery resulting from computer security incidents

A

Computer Incident Response Team (CIRT)

39
Q

To develop, validate, and promote timely best practice solutions that help people, business and governments protect themselves against pervasive cyber threats

A

Center for Internet Security (CIS)

40
Q

Is software that helps users create, manage, and modify content on a website without the need for technical knowledge.

A

Content Management System (CMS)

41
Q

The worlds leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment

A

Cloud Security Alliance (CSA)

42
Q

Is a group of IT professionals that provides an organization with services and support surrounding the assessment, management and prevention of cybersecurity-related emergencies, as well as coordination of incident response efforts

A

Computer Security Incident Response Team (CSIRT)

43
Q

A third party company offering cloud-based platform, infrastructure, application or storage service.

A

Cloud Service Provider (CSP)

44
Q

Is an attack that forces an end user to execute unwanted actions on a web application in which they’re currently authenticated With help of Social Engineering

A

Cross-Site Request Forgery (CSRF)

45
Q

A simple counter-based block cipher implementation Every time a counter initiated value is encrypted and given as input to XOR with plaintext which results in ciphertext block

A

Counter-Mode (CTM)

46
Q

Is a database of publicly disclosed information security issues

A

Common Vulnerabilities and Exposures (CVE)

47
Q

Is a free and open industry standard for assessing the severity of computer system security vulnerabilities

A

Common Vulnerabilities and Scoring System (CVSS)

48
Q

A hardware management model in which employees select a preferred device from a company-approved range of options

A

Choose your own Device (CYOD)

49
Q

Is the principle of restricting access to objects based on the identity of the subject (the user or group to which the user belongs)

A

Discretionary Access Control (DAC)

50
Q

Responsible for maintaining, securing, and operating databases and also ensures that data is correctly stored and returned

A

Database Administrator (DBA)

51
Q

A malicious attempt to disrupt the normal traffic of a targeted server, service or network by overwhelming the target or its surrounding infrastructure with a flood or internal traffic

A

Distributed Denial-of-Service (DDoS)

52
Q

Helps protect you from executable code launching from places its not supposed to

A

Data Execution Prevention (DEP)