Comprehensive guide Chat GPT 2.0 Flashcards

1
Q

AAL

A

Authentication Assurance Level - AAL levels define the strength of authentication methods used in systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

AAA

A

Authentication, Authorization, and Accounting - A framework for managing user access and accounting for resource usage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

AES

A

Advanced Encryption Standard - AES is used to encrypt sensitive data stored in cloud services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ACL

A

Access Control List - A router has an ACL that allows only specific IP addresses to access certain network resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

APT

A

Advanced Persistent Threat - APTs are sophisticated attacks that gain unauthorized access and remain undetected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

BYOD

A

Bring Your Own Device - A BYOD policy allows employees to use personal devices for work purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

BIA

A

Business Impact Analysis - Identifies critical business functions and the impact of disruptions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

CIA Triad

A

Confidentiality, Integrity, and Availability - The three core principles of information security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

CASB

A

Cloud Access Security Broker - A software tool that acts as a mediator between cloud service users and providers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

CCL

A

Common Control Line - CCL is used to define shared controls within organizations to manage risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

CISO

A

Chief Information Security Officer - The CISO is responsible for developing and implementing the company’s information security strategy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

CI/CD

A

Continuous Integration/Continuous Deployment - Practices that enhance software development and deployment security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

CVE

A

Common Vulnerabilities and Exposures - CVE identifiers help track vulnerabilities in software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

CVSS

A

Common Vulnerability Scoring System - CVSS scores help prioritize vulnerabilities based on their severity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

DNSSEC

A

Domain Name System Security Extensions - A suite of extensions that add security to the DNS protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

DLP

A

Data Loss Prevention - A DLP system detects and prevents the transfer of sensitive data outside the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

DDoS

A

Distributed Denial of Service - An attack that overwhelms a server with traffic, making it unavailable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

EAP

A

Extensible Authentication Protocol - An authentication framework frequently used in wireless networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

EDR

A

Endpoint Detection and Response - EDR solutions provide real-time monitoring and data collection from endpoints.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

FIM

A

File Integrity Monitoring - FIM detects unauthorized changes to files and alerts administrators.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

FIPS

A

Federal Information Processing Standards - FIPS are mandatory for federal agencies to ensure security in IT systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Fuzzing

A

A technique used to discover vulnerabilities by inputting random data into software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

GPO

A

Group Policy Object - A feature in Windows that allows for centralized management of user and computer settings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

GDPR

A

General Data Protection Regulation - GDPR requires organizations to protect personal data and privacy for EU citizens.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

HIDS

A

Host Intrusion Detection System - HIDS checks a host for signs of malicious activity and reports them to the admin.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

HIPS

A

Host Intrusion Prevention System - HIPS protects individual devices from attacks by monitoring system behavior.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

HSM

A

Hardware Security Module - A physical device used to manage and secure digital keys and perform encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

IMSI

A

International Mobile Subscriber Identity - A unique identifier for a mobile user, used in cellular networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Incident Response Steps

A
  1. Preparation 2. Detection 3. Containment 4. Eradication 5. Recovery 6. Lessons Learned
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

ISO

A

International Organization for Standardization - ISO 27001 outlines requirements for establishing an information security management system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

IDS

A

Intrusion Detection System - An IDS monitors network traffic for suspicious activities and alerts administrators.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

IPS

A

Intrusion Prevention System - An IPS can block malicious traffic in real time, preventing attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

MDM

A

Mobile Device Management - MDM solutions allow organizations to manage and secure employees’ mobile devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

MITM

A

Man-In-The-Middle - MITM attacks intercept communications between two parties to eavesdrop or alter messages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

NAC

A

Network Access Control - A solution that enforces security policies on devices accessing the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

NIDS

A

Network Intrusion Detection System - NIDS monitors network traffic and alerts on suspicious behavior.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

NIPS

A

Network Intrusion Prevention System - NIPS actively blocks potentially harmful traffic on the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

NIST

A

National Institute of Standards and Technology - NIST provides guidelines for improving the security of information systems across various industries.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

PSTN

A

Public Switched Telephone Network - The traditional circuit-switched telephone network used for public telecommunication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

PKI

A

Public Key Infrastructure - PKI is used to issue digital certificates that validate user identities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

RAT

A

Remote Access Trojan - Malware that allows unauthorized remote access to a victim’s computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

RPO

A

Recovery Point Objective - A business aims for an RPO of one hour, meaning data loss should not exceed one hour’s worth of transactions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

RTO

A

Recovery Time Objective - The RTO defines how quickly a system should be restored after a failure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

RADIUS

A

Remote Authentication Dial-In User Service - RADIUS is used to manage access for remote users connecting to a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Ransomware

A

A type of malware that encrypts files and demands payment for the decryption key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Replay Attack

A

An attack where valid data transmission is maliciously or fraudulently repeated or delayed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

SAML

A

Security Assertion Markup Language - A standard for exchanging authentication and authorization data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Sandboxing

A

Running untested code or applications in a controlled environment to prevent harm to the host system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

SHA

A

Secure Hash Algorithm - SHA is used to ensure data integrity by generating a unique hash for data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

SIEM

A

Security Information and Event Management - SIEM systems aggregate and analyze log data to detect security incidents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

SOC

A

Security Operations Center - A SOC monitors and analyzes security events in real-time to respond to incidents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

SOAR

A

Security Orchestration, Automation, and Response - Integrates security tools and processes to improve response times.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

SPF

A

Sender Policy Framework - An email authentication method to prevent spoofing.

54
Q

SSL

A

Secure Sockets Layer - SSL certificates secure web traffic between a user’s browser and a web server.

55
Q

SSL/TLS

A

Secure Sockets Layer/Transport Layer Security - Protocols that encrypt data sent over the internet.

56
Q

TACACS+

A

Terminal Access Controller Access-Control System Plus - TACACS+ provides centralized authentication for network devices.

57
Q

TFA

A

Two-Factor Authentication - An extra layer of security requiring two forms of verification.

58
Q

TLS

A

Transport Layer Security - TLS encrypts data transmitted over the internet, securing online communications.

59
Q

TPM

A

Trusted Platform Module - A hardware chip that provides cryptographic functions to secure hardware.

60
Q

TTT

A

Tactics, Techniques, and Procedures - Understanding an attacker’s TTP helps in designing better defenses.

61
Q

USB

A

Universal Serial Bus - A standard for connecting devices that may pose security risks if not managed properly.

62
Q

VLAN

A

Virtual Local Area Network - A subgroup within a network that combines multiple physical networks.

63
Q

WAF

A

Web Application Firewall - A WAF protects web applications from common attacks like SQL injection.

64
Q

WEP

A

Wired Equivalent Privacy - An outdated wireless security protocol that is no longer considered secure.

65
Q

WPA

A

Wi-Fi Protected Access - A security protocol for wireless networks that is more secure than WEP.

66
Q

WPA2

A

Wi-Fi Protected Access 2 - An enhancement to WPA that uses AES encryption for improved security.

67
Q

XSS

A

Cross-Site Scripting - A vulnerability allowing attackers to inject scripts into web pages viewed by users.

68
Q

XSRF

A

Cross-Site Request Forgery - An attack that tricks a user into executing unwanted actions on a web application.

69
Q

Zero-Day

A

A vulnerability that is unknown to the vendor, with no patch available at the time of discovery.

70
Q

Risk Formula

A

Risk = Threat × Vulnerability × Asset Value

71
Q

Annual Loss Expectancy (ALE)

A

ALE = Single Loss Expectancy (SLE) × Annual Rate of Occurrence (ARO)

72
Q

Single Loss Expectancy (SLE)

A

SLE = Asset Value × Exposure Factor (EF)

73
Q

Bandwidth Utilization

A

Utilization = (Average Throughput / Total Bandwidth) × 100%

74
Q

Symmetric Encryption

A

Encryption where the same key is used for both encryption and decryption.

75
Q

Asymmetric Encryption

A

Encryption that uses a pair of keys: a public key for encryption and a private key for decryption.

76
Q

Hashing

A

A process that converts data into a fixed-length string of characters, which is typically a digest that represents the data.

77
Q

Incident Response Steps

A
  1. Preparation 2. Detection 3. Containment 4. Eradication 5. Recovery 6. Lessons Learned
78
Q

Preventive Controls

A

Controls that prevent security incidents from occurring.

79
Q

Detective Controls

A

Controls that detect and alert on security incidents as they occur.

80
Q

Corrective Controls

A

Controls that respond to and rectify security incidents.

81
Q

Risk Formula

A

Risk = Threat × Vulnerability × Asset Value

82
Q

Annual Loss Expectancy (ALE)

A

ALE = Single Loss Expectancy (SLE) × Annual Rate of Occurrence (ARO)

83
Q

Single Loss Expectancy (SLE)

A

SLE = Asset Value × Exposure Factor (EF)

84
Q

Bandwidth Utilization

A

Utilization = (Average Throughput / Total Bandwidth) × 100%

85
Q

Symmetric Encryption

A

Encryption where the same key is used for both encryption and decryption.

86
Q

Asymmetric Encryption

A

Encryption that uses a pair of keys: a public key for encryption and a private key for decryption.

87
Q

Hashing

A

A process that converts data into a fixed-length string of characters, which is typically a digest that represents the data.

88
Q

Incident Response Steps

A
  1. Preparation 2. Detection 3. Containment 4. Eradication 5. Recovery 6. Lessons Learned
89
Q

Preventive Controls

A

Controls that prevent security incidents from occurring.

90
Q

Detective Controls

A

Controls that detect and alert on security incidents as they occur.

91
Q

Corrective Controls

A

Controls that respond to and rectify security incidents.

92
Q

FTP - Fish Tacos Please

A

File Transfer Protocol; used for transferring files.

93
Q

SSH - Super Sneaky Hoppers

A

Secure Shell; secure remote login and file transfer.

94
Q

SMTP - Sending Mail To Penguins

A

Simple Mail Transfer Protocol; used for sending emails.

95
Q

DNS - Ducks Navigate Swiftly

A

Domain Name System; translates domain names to IP addresses.

96
Q

DHCP - Dancing Hippos Celebrate Parties

A

Dynamic Host Configuration Protocol; assigns IP addresses.

97
Q

HTTP - Hungry Tacos Please

A

Hypertext Transfer Protocol; used for web pages.

98
Q

HTTPS - Hasty Turtles Protect Secrets

A

Hypertext Transfer Protocol Secure; secure web browsing.

99
Q

POP3 - Pigeons Often Post

A

Post Office Protocol version 3; retrieves emails.

100
Q

IMAP - Iguanas Mail A Lot

A

Internet Message Access Protocol; access email from multiple devices.

101
Q

RDP - Really Daring Penguins

A

Remote Desktop Protocol; remote desktop connections.

102
Q

Telnet - Turtles Enjoy Leisurely Netting

A

Insecure remote login.

103
Q

TFTP - Tiny Frogs Transfer Files

A

Trivial File Transfer Protocol; simple file transfers.

104
Q

NTP - Napping Turtles Party

A

Network Time Protocol; synchronizes clocks.

105
Q

NetBIOS - Naughty Elephants Bathe In Oceans

A

Used for Windows file sharing and network communication.

106
Q

SNMP - Silly Nerds Manage Penguins

A

Simple Network Management Protocol; network device management.

107
Q

SMTPS - Silly Mice Take Protective Stances

A

Secure SMTP; secure email transmission.

108
Q

Syslog - Silly Yaks Log Everything

A

Syslog protocol; for logging messages.

109
Q

IPP - Irresistible Pizzas for Printing

A

Internet Printing Protocol; manages print jobs.

110
Q

FTPS - Friendly Turtles Protect Secrets

A

Secure FTP; encrypted file transfers.

111
Q

VNC - Vicious Newts Control

A

Virtual Network Computing; remote desktop access.

112
Q

HTTP-alt - Hungry Tacos, Too!

A

Alternative HTTP service.

113
Q

HTTP-proxy - Helpful Penguins Proxy

A

Alternative HTTP port often used for proxies.

114
Q

HTTPS-alt - Happy Turtles Playing Securely

A

Alternate port for HTTPS traffic.

115
Q

Webmin - Wacky Elephants Bring Mayhem

A

Webmin management interface.

116
Q

MS RPC - Mice Share Really Pleasant Cookies

A

Microsoft Remote Procedure Call; service for Windows communication.

117
Q

MS SQL - Many Squirrels Quickly Launch

A

Microsoft SQL Server; database communication.

118
Q

NFS - Nifty Frogs Share

A

Network File System; file sharing across networks.

119
Q

MySQL - My Sassy Quokka Loves

A

MySQL database server; communicates with databases.

120
Q

UPnP - Unicorns Prefer Networking Parties

A

Universal Plug and Play; network device discovery.

121
Q

RTSP - Really Tall Snakes Play

A

Real-Time Streaming Protocol; controls streaming media.

122
Q

SIP - Silly Iguanas Party

A

Session Initiation Protocol; for initiating VoIP calls.

123
Q

PostgreSQL - Pandas Go Swimming Quickly

A

PostgreSQL database; communication for the database.

124
Q

Docker - Daring Otters Climb Kites

A

Default Docker port.

125
Q

XMPP - Xylophones Make People Party

A

Extensible Messaging and Presence Protocol; for instant messaging.

126
Q

VNC - Very Nice Chameleons

A

Virtual Network Computing; remote access.

127
Q

X11 - Xylophones Play Loudly

A

X Window System; for GUI on Unix/Linux systems.

128
Q

RealServer - Rabbits Enjoy Awesome Naps

A

Real-Time Streaming server.

129
Q

HTTP-alt - Hungry Tacos, Part Two

A

Alternative HTTP service.

130
Q

HTTP-proxy - Hungry Tacos, Again

A

Alternative HTTP port for proxy services.

131
Q

HTTPS-alt - Happy Turtles at 8

A

Alternate port for HTTPS traffic.