Core Definitions Flashcards

1
Q

What is an Absolute file path?

A

The full file path, which starts from the root.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are Access controls?

A

Security controls that manage access, authorization, and accountability of information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Active packet sniffing?

A

A type of attack where data packets are manipulated in transit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Address Resolution Protocol (ARP)?

A

A network protocol used to determine the MAC address of the next router or device on the path.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is an Advanced persistent threat (APT)?

A

An instance when a threat actor maintains unauthorized access to a system for an extended period of time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Adversarial artificial intelligence (AAI)?

A

A technique that manipulates artificial intelligence (AI) and machine learning (ML) technology to conduct attacks more efficiently.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Adware?

A

A type of legitimate software that is sometimes used to display digital advertisements in applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is an Algorithm?

A

A set of rules used to solve a problem.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Analysis in cybersecurity?

A

The investigation and validation of alerts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Angler phishing?

A

A technique where attackers impersonate customer service representatives on social media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Anomaly-based analysis?

A

A detection method that identifies abnormal behavior.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Antivirus software?

A

A software program used to prevent, detect, and eliminate malware and viruses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is an Application?

A

A program that performs a specific task.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is an Application programming interface (API) token?

A

A small block of encrypted code that contains information about a user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is an Argument in Linux?

A

Specific information needed by a command in the CLI.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is an Argument in Python?

A

The data brought into a function when it is called.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is an Array?

A

A data type that stores data in a comma-separated ordered list.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What does Assess mean in the NIST RMF?

A

The fifth step of the NIST RMF that means to determine if established controls are implemented correctly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is an Asset?

A

An item perceived as having value to an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is Asset classification?

A

The practice of labeling assets based on sensitivity and importance to an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is Asset inventory?

A

A catalog of assets that need to be protected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is Asset management?

A

The process of tracking assets and the risks that affect them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is Asymmetric encryption?

A

The use of a public and private key pair for encryption and decryption of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is an Attack surface?

A

All the potential vulnerabilities that a threat actor could exploit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is an Attack tree?

A

A diagram that maps threats to assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What are Attack vectors?

A

The pathways attackers use to penetrate security defenses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is Authentication?

A

The process of verifying who someone is.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is Authorization?

A

The concept of granting access to specific resources in a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What does Authorize mean in the NIST RMF?

A

The sixth step of the NIST RMF that refers to being accountable for the security and privacy risks that might exist in an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is Automation?

A

The use of technology to reduce human and manual effort to perform common and repetitive tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is Availability in cybersecurity?

A

The idea that data is accessible to those who are authorized to access it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What is Baiting?

A

A social engineering tactic that tempts people into compromising their security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What is Bandwidth?

A

The maximum data transmission capacity over a network, measured by bits per second.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What is Baseline configuration?

A

A documented set of specifications within a system that is used as a basis for future builds, releases, and updates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What is Bash?

A

The default shell in most Linux distributions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What is Basic auth?

A

The technology used to establish a user’s request to access a server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What is Basic Input/Output System (BIOS)?

A

A microchip that contains loading instructions for the computer and is prevalent in older systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What are Biometrics?

A

The unique physical characteristics that can be used to verify a person’s identity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What is a Bit?

A

The smallest unit of data measurement on a computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What is Boolean data?

A

Data that can only be one of two values: either True or False.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What is a Bootloader?

A

A software program that boots the operating system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What is a Botnet?

A

A collection of computers infected by malware that are under the control of a single threat actor, known as the ‘bot-herder’.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

What is Bracket notation?

A

The indices placed in square brackets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What is a Broken chain of custody?

A

Inconsistencies in the collection and logging of evidence in the chain of custody.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

What is a Brute force attack?

A

The trial and error process of discovering private information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

What is a Bug bounty?

A

Programs that encourage freelance hackers to find and report vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

What is a Built-in function?

A

A function that exists within Python and can be called directly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

What is Business continuity?

A

An organization’s ability to maintain their everyday productivity by establishing risk disaster recovery plans.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

What is a Business continuity plan (BCP)?

A

A document that outlines the procedures to sustain business operations during and after a significant disruption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

What is Business Email Compromise (BEC)?

A

A type of phishing attack where a threat actor impersonates a known source to obtain financial advantage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

What does Categorize mean in the NIST RMF?

A

The second step of the NIST RMF that is used to develop risk management processes and tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

What is CentOS?

A

An open-source distribution that is closely related to Red Hat.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

What is Central Processing Unit (CPU)?

A

A computer’s main processor, which is used to perform general computing tasks on a computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

What is Chain of custody?

A

The process of documenting evidence possession and control during an incident lifecycle.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

What is Chronicle?

A

A cloud-native tool designed to retain, analyze, and search data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

What is a Cipher?

A

An algorithm that encrypts information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

What are Cloud-based firewalls?

A

Software firewalls that are hosted by the cloud service provider.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

What is Cloud computing?

A

The practice of using remote servers, applications, and network services that are hosted on the internet instead of on local physical devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

What is a Cloud network?

A

A collection of servers or computers that stores resources and data in remote data centers that can be accessed via the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

What is Cloud security?

A

The process of ensuring that assets stored in the cloud are properly configured and access to those assets is limited to authorized users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

What is a Command?

A

An instruction telling the computer to do something.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

What is Command and control (C2)?

A

The techniques used by malicious actors to maintain communications with compromised systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

What is a Command-line interface (CLI)?

A

A text-based user interface that uses commands to interact with the computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

What is a Comment in programming?

A

A note programmers make about the intention behind their code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

What is Common Event Format (CEF)?

A

A log format that uses key-value pairs to structure data and identify fields and their corresponding values.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

What is the Common Vulnerabilities and Exposures (CVE®) list?

A

An openly accessible dictionary of known vulnerabilities and exposures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

What is the Common Vulnerability Scoring System (CVSS)?

A

A measurement system that scores the severity of a vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

What is Compliance?

A

The process of adhering to internal standards and external regulations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

What are Computer security incident response teams (CSIRT)?

A

A specialized group of security professionals that are trained in incident management and response.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

What is a Computer virus?

A

Malicious code written to interfere with computer operations and cause damage to data and software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

What is a Conditional statement?

A

A statement that evaluates code to determine if it meets a specified set of conditions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

What is Confidentiality?

A

The idea that only authorized users can access specific assets or data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

What is Confidential data?

A

Data that often has limits on the number of people who have access to it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

What is the Confidentiality, integrity, availability (CIA) triad?

A

A model that helps inform how organizations consider risk when setting up systems and security policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

What is a Configuration file?

A

A file used to configure the settings of an application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

What is Containment?

A

The act of limiting and preventing additional damage caused by an incident.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

What is a Controlled zone?

A

A subnet that protects the internal network from the uncontrolled zone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

What is Cross-site scripting (XSS)?

A

An injection attack that inserts code into a vulnerable website or web application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

What is Crowdsourcing?

A

The practice of gathering information using public input and collaboration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

What is a Cryptographic attack?

A

An attack that affects secure forms of communication between a sender and intended recipient.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

What is a Cryptographic key?

A

A mechanism that decrypts ciphertext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

What is Cryptography?

A

The process of transforming information into a form that unintended readers can’t understand.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

What is Cryptojacking?

A

A form of malware that installs software to illegally mine cryptocurrencies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

What is a CVE Numbering Authority (CNA)?

A

An organization that volunteers to analyze and distribute information on eligible CVEs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

What is Cybersecurity?

A

The practice of ensuring confidentiality, integrity, and availability of information by protecting networks, devices, people, and data from unauthorized access or criminal exploitation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

What is Data?

A

Information that is translated, processed, or stored by a computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

What is Data at rest?

A

Data not currently being accessed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

What is a Database?

A

An organized collection of information or data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

What is a Data controller?

A

A person that determines the procedure and purpose for processing data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

What is a Data custodian?

A

Anyone or anything that’s responsible for the safe handling, transport, and storage of information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

What is Data exfiltration?

A

Unauthorized transmission of data from a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

What is Data in transit?

A

Data traveling from one point to another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

What is Data in use?

A

Data being accessed by one or more users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

What is a Data owner?

A

The person who decides who can access, edit, use, or destroy their information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

What is a Data packet?

A

A basic unit of information that travels from one device to another within a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

What is a Data point?

A

A specific piece of information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

What is a Data processor?

A

A person that is responsible for processing data on behalf of the data controller.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

What is a Data protection officer (DPO)?

A

An individual that is responsible for monitoring the compliance of an organization’s data protection procedures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

What is a Data type?

A

A category for a particular type of data item.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

What is Date and time data?

A

Data representing a date and/or time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

What is a Debugger?

A

A software tool that helps to locate the source of an error and assess its causes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

What is Debugging?

A

The practice of identifying and fixing errors in code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

What is Defense in depth?

A

A layered approach to vulnerability management that reduces risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

What is a Denial of service (DoS) attack?

A

An attack that targets a network or server and floods it with network traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

What does Detect mean in NIST?

A

A NIST core function related to identifying potential security incidents and improving monitoring capabilities to increase the speed and efficiency of detections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q

What is Detection?

A

The prompt discovery of security events.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q

What is Dictionary data?

A

Data that consists of one or more key-value pairs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
108
Q

What is a Digital certificate?

A

A file that verifies the identity of a public key holder.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
109
Q

What is Digital forensics?

A

The practice of collecting and analyzing data to determine what has happened after an attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
110
Q

What is a Directory?

A

A file that organizes where other files are stored.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
111
Q

What is a Disaster recovery plan?

A

A plan that allows an organization’s security team to outline the steps needed to minimize the impact of a security incident.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
112
Q

What is a Distributed denial of service (DDoS) attack?

A

A type of denial of service attack that uses multiple devices or servers located in different locations to flood the target network with unwanted traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
113
Q

What are Distributions in Linux?

A

The different versions of Linux.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
114
Q

What is Documentation?

A

Any form of recorded content that is used for a specific purpose.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
115
Q

What is a DOM-based XSS attack?

A

An instance when malicious script exists in the webpage a browser loads.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
116
Q

What is Domain Name System (DNS)?

A

A networking protocol that translates internet domain names into IP addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
117
Q

What is a Dropper?

A

A type of malware that comes packed with malicious code which is delivered and installed onto a target system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
118
Q

What is an Elevator pitch?

A

A brief summary of your experience, skills, and background.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
119
Q

What is Encapsulation?

A

A process performed by a VPN service that protects your data by wrapping sensitive data in other data packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
120
Q

What is Encryption?

A

The process of converting data from a readable format to an encoded format.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
121
Q

What is an Endpoint?

A

Any device connected on a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
122
Q

What is Endpoint detection and response (EDR)?

A

An application that monitors an endpoint for malicious activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
123
Q

What is Eradication?

A

The complete removal of the incident elements from all affected systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
124
Q

What is an Escalation policy?

A

A set of actions that outline who should be notified when an incident alert occurs and how that incident should be handled.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
125
Q

What is an Event?

A

An observable occurrence on a network, system, or device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
126
Q

What is an Exception?

A

An error that involves code that cannot be executed even though it is syntactically correct.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
127
Q

What is an Exclusive operator?

A

An operator that does not include the value of comparison.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
128
Q

What is an Exploit?

A

A way of taking advantage of a vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
129
Q

What is Exposure?

A

A mistake that can be exploited by a threat.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
130
Q

What is an External threat?

A

Anything outside the organization that has the potential to harm organizational assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
131
Q

What is a false negative?

A

A state where the presence of a threat is not detected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
132
Q

What is a false positive?

A

An alert that incorrectly detects the presence of a threat.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
133
Q

What is fileless malware?

A

Malware that does not need to be installed by the user because it uses legitimate programs that are already installed to infect a computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
134
Q

What is a file path?

A

The location of a file or directory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
135
Q

What is the Filesystem Hierarchy Standard (FHS)?

A

The component of the Linux OS that organizes data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
136
Q

What is filtering?

A

Selecting data that match a certain condition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
137
Q

What is a final report?

A

Documentation that provides a comprehensive review of an incident.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
138
Q

What is a firewall?

A

A network security device that monitors traffic to or from a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
139
Q

What is float data?

A

Data consisting of a number with a decimal point.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
140
Q

What is a foreign key?

A

A column in a table that is a primary key in another table.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
141
Q

What is a forward proxy server?

A

A server that regulates and restricts a person’s access to the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
142
Q

What is a function in programming?

A

A section of code that can be reused in a program.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
143
Q

What is a global variable?

A

A variable that is available through the entire program.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
144
Q

What is a graphical user interface (GUI)?

A

A user interface that uses icons on the screen to manage different tasks on the computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
145
Q

Who is a hacker?

A

Any person who uses computers to gain access to computer systems, networks, or data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
146
Q

What is a hacktivist?

A

A person who uses hacking to achieve a political goal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
147
Q

What is a hard drive?

A

A hardware component used for long-term memory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
148
Q

What is hardware?

A

The physical components of a computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
149
Q

What is a hash collision?

A

An instance when different inputs produce the same hash value.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
150
Q

What is a hash function?

A

An algorithm that produces a code that can’t be decrypted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
151
Q

What is a hash table?

A

A data structure that’s used to store and reference hash values.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
152
Q

What is the Health Insurance Portability and Accountability Act (HIPAA)?

A

A U.S. federal law established to protect patients’ health information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
153
Q

What is a honeypot?

A

A system or resource created as a decoy vulnerable to attacks with the purpose of attracting potential intruders.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
154
Q

What is a host-based intrusion detection system (HIDS)?

A

An application that monitors the activity of the host on which it’s installed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
155
Q

What is a hub?

A

A network device that broadcasts information to every device on the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
156
Q

What is Hypertext Transfer Protocol (HTTP)?

A

An application layer protocol that provides a method of communication between clients and website servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
157
Q

What is Hypertext Transfer Protocol Secure (HTTPS)?

A

A network protocol that provides a secure method of communication between clients and website servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
158
Q

What does it mean to identify in cybersecurity?

A

A NIST core function related to management of cybersecurity risk and its effect on an organization’s people and assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
159
Q

What is identity and access management (IAM)?

A

A collection of processes and technologies that helps organizations manage digital identities in their environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
160
Q

What is IEEE 802.11 (Wi-Fi)?

A

A set of standards that define communication for wireless LANs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
161
Q

What does immutable mean in programming?

A

An object that cannot be changed after it is created and assigned a value.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
162
Q

What does it mean to implement in the NIST RMF?

A

The fourth step of the NIST RMF that means to implement security and privacy plans for an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
163
Q

What is improper usage?

A

An incident type that occurs when an employee of an organization violates the organization’s acceptable use policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
164
Q

What is an incident?

A

An occurrence that actually or imminently jeopardizes, without lawful authority, the confidentiality, integrity, or availability of information or an information system; or constitutes a violation or imminent threat of violation of law, security policies, security procedures, or acceptable use policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
165
Q

What is incident escalation?

A

The process of identifying a potential security incident, triaging it, and handing it off to a more experienced team member.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
166
Q

What is an incident handler’s journal?

A

A form of documentation used in incident response.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
167
Q

What is incident response?

A

An organization’s quick attempt to identify an attack, contain the damage, and correct the effects of a security breach.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
168
Q

What is an incident response plan?

A

A document that outlines the procedures to take in each step of incident response.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
169
Q

What is an inclusive operator?

A

An operator that includes the value of comparison.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
170
Q

What is indentation in programming?

A

Space added at the beginning of a line of code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
171
Q

What is an index?

A

A number assigned to every element in a sequence that indicates its position.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
172
Q

What are indicators of attack (IoA)?

A

The series of observed events that indicate a real-time incident.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
173
Q

What are indicators of compromise (IoC)?

A

Observable evidence that suggests signs of a potential security incident.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
174
Q

What is information privacy?

A

The protection of unauthorized access and distribution of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
175
Q

What is information security (InfoSec)?

A

The practice of keeping data in all states away from unauthorized users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
176
Q

What is an injection attack?

A

Malicious code inserted into a vulnerable application.

177
Q

What is input validation?

A

Programming that validates inputs from users and other programs.

178
Q

What is integer data?

A

Data consisting of a number that does not include a decimal point.

179
Q

What is an integrated development environment (IDE)?

A

A software application for writing code that provides editing assistance and error correction tools.

180
Q

What is integrity in data?

A

The idea that the data is correct, authentic, and reliable.

181
Q

What is internal hardware?

A

The components required to run the computer.

182
Q

What is an internal threat?

A

A current or former employee, external vendor, or trusted partner who poses a security risk.

183
Q

What is Internet Control Message Protocol (ICMP)?

A

An internet protocol used by devices to tell each other about data transmission errors across the network.

184
Q

What is an Internet Control Message Protocol flood (ICMP flood)?

A

A type of DoS attack performed by an attacker repeatedly sending ICMP request packets to a network server.

185
Q

What is Internet Protocol (IP)?

A

A set of standards used for routing and addressing data packets as they travel between devices on a network.

186
Q

What is an Internet Protocol (IP) address?

A

A unique string of characters that identifies the location of a device on the internet.

187
Q

What is an interpreter?

A

A computer program that translates Python code into runnable instructions line by line.

188
Q

What is an intrusion detection system (IDS)?

A

An application that monitors system activity and alerts on possible intrusions.

189
Q

What is an intrusion prevention system (IPS)?

A

An application that monitors system activity for intrusive activity and takes action to stop the activity.

190
Q

What is IP spoofing?

A

A network attack performed when an attacker changes the source IP of a data packet to impersonate an authorized system and gain access to a network.

191
Q

What is an iterative statement?

A

Code that repeatedly executes a set of instructions.

192
Q

What is KALI LINUX ™?

A

An open-source distribution of Linux that is widely used in the security industry.

193
Q

What is a kernel?

A

The component of the Linux OS that manages processes and memory.

194
Q

What is a key-value pair?

A

A set of data that represents two linked items: a key, and its corresponding value.

195
Q

What is a legacy operating system?

A

An operating system that is outdated but still being used.

196
Q

What is a lessons learned meeting?

A

A meeting that includes all involved parties after a major incident.

197
Q

What is a library in programming?

A

A collection of modules that provide code users can access in their programs.

198
Q

What is Linux?

A

An open-source operating system.

199
Q

What is list concatenation?

A

The concept of combining two lists into one by placing the elements of the second list directly after the elements of the first list.

200
Q

What is list data?

A

Data structure that consists of a collection of data in sequential form.

201
Q

What is a loader?

A

A type of malware that downloads strains of malicious code from an external source and installs them onto a target system.

202
Q

What is a Local Area Network (LAN)?

A

A network that spans small areas like an office building, a school, or a home.

203
Q

What is a local variable?

A

A variable assigned within a function.

204
Q

What is a log?

A

A record of events that occur within an organization’s systems.

205
Q

What is log analysis?

A

The process of examining logs to identify events of interest.

206
Q

What is logging?

A

The recording of events occurring on computer systems and networks.

207
Q

What is a logic error?

A

An error that results when the logic used in code produces unintended results.

208
Q

What is log management?

A

The process of collecting, storing, analyzing, and disposing of log data.

209
Q

What is a loop condition?

A

The part of a loop that determines when the loop terminates.

210
Q

What is a loop variable?

A

A variable that is used to control the iterations of a loop.

211
Q

What is malware?

A

Software designed to harm devices or networks.

212
Q

What is a malware infection?

A

An incident type that occurs when malicious software designed to disrupt a system infiltrates an organization’s computers or network.

213
Q

What is a Media Access Control (MAC) address?

A

A unique alphanumeric identifier that is assigned to each physical device on a network.

214
Q

What is a method in programming?

A

A function that belongs to a specific data type.

215
Q

What are metrics in software applications?

A

Key technical attributes such as response time, availability, and failure rate, which are used to assess the performance of a software application.

216
Q

What is MITRE?

A

A collection of non-profit research and development centers.

217
Q

What is a modem?

A

A device that connects your router to the internet and brings internet access to the LAN.

218
Q

What is a module in Python?

A

A Python file that contains additional functions, variables, classes, and any kind of runnable code.

219
Q

What is monitor in the NIST RMF?

A

The seventh step of the NIST RMF that means be aware of how systems are operating.

220
Q

What is multi-factor authentication (MFA)?

A

A security measure that requires a user to verify their identity in two or more ways to access a system or network.

221
Q

What is nano?

A

A command-line file editor that is available by default in many Linux distributions.

222
Q

What is the National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF)?

A

A voluntary framework that consists of standards, guidelines, and best practices to manage cybersecurity risk.

223
Q

What is the National Institute of Standards and Technology (NIST) Incident Response Lifecycle?

A

A framework for incident response consisting of four phases: Preparation; Detection and Analysis; Containment, Eradication and Recovery, and Post-incident activity.

224
Q

What is the National Institute of Standards and Technology (NIST) Special Publication (S.P.) 800-53?

A

A unified framework for protecting the security of information systems within the U.S. federal government.

225
Q

What is a network?

A

A group of connected devices.

226
Q

What is a network-based intrusion detection system (NIDS)?

A

An application that collects and monitors network traffic and network data.

227
Q

What is network data?

A

The data that’s transmitted between devices on a network.

228
Q

What is a Network Interface Card (NIC)?

A

Hardware that connects computers to a network.

229
Q

What is network log analysis?

A

The process of examining network logs to identify events of interest.

230
Q

What is a network protocol analyzer (packet sniffer)?

A

A tool designed to capture and analyze data traffic within a network.

231
Q

What are network protocols?

A

A set of rules used by two or more devices on a network to describe the order of delivery and the structure of data.

232
Q

What is network security?

A

The practice of keeping an organization’s network infrastructure secure from unauthorized access.

233
Q

What is network segmentation?

A

A security technique that divides the network into segments.

234
Q

What is network traffic?

A

The amount of data that moves across a network.

235
Q

What is non-repudiation?

A

The concept that the authenticity of information can’t be denied.

236
Q

What is a notebook in programming?

A

An online interface for writing, storing, and running code.

237
Q

What is numeric data?

A

Data consisting of numbers.

238
Q

What is OAuth?

A

An open-standard authorization protocol that shares designated access between applications.

239
Q

What is an Object?

A

A data type that stores data in a comma-separated list of key-value pairs.

240
Q

What is an On-path attack?

A

An attack where a malicious actor places themselves in the middle of an authorized connection and intercepts or alters the data in transit.

241
Q

What is Open-source intelligence (OSINT)?

A

The collection and analysis of information from publicly available sources to generate usable intelligence.

242
Q

What is the Open systems interconnection (OSI) model?

A

A standardized concept that describes the seven layers computers use to communicate and send data over the network.

243
Q

What is OWASP?

A

A non-profit organization focused on improving software security.

244
Q

What is an Operating system (OS)?

A

The interface between computer hardware and the user.

245
Q

What is an Operator?

A

A symbol or keyword that represents an operation.

246
Q

What are Options in a command?

A

Input that modifies the behavior of a command.

247
Q

What is the Order of volatility?

A

A sequence outlining the order of data that must be preserved from first to last.

248
Q

What is the OWASP Top 10?

A

A globally recognized standard awareness document that lists the top 10 most critical security risks to web applications.

249
Q

What is a Package?

A

A piece of software that can be combined with other packages to form an application.

250
Q

What is a Package manager?

A

A tool that helps users install, manage, and remove packages or applications.

251
Q

What is Packet capture (P-cap)?

A

A file containing data packets intercepted from an interface or network.

252
Q

What is Packet sniffing?

A

The practice of capturing and inspecting data packets across a network.

253
Q

What is a Parameter in Python?

A

An object that is included in a function definition for use in that function.

254
Q

What is Parrot?

A

An open-source distribution that is commonly used for security.

255
Q

What is Parsing?

A

The process of converting data into a more readable format.

256
Q

What is Passive packet sniffing?

A

A type of attack where a malicious actor connects to a network hub and looks at all traffic on the network.

257
Q

What is a Password attack?

A

An attempt to access password secured devices, systems, networks, or data.

258
Q

What is a Patch update?

A

A software and operating system update that addresses security vulnerabilities within a program or product.

259
Q

What are Payment Card Industry Data Security Standards (PCI DSS)?

A

A set of security standards formed by major organizations in the financial industry.

260
Q

What is a Penetration test (pen test)?

A

A simulated attack that helps identify vulnerabilities in systems, networks, websites, applications, and processes.

261
Q

What is the PEP 8 style guide?

A

A resource that provides stylistic guidelines for programmers working in Python.

262
Q

What are Peripheral devices?

A

Hardware components that are attached and controlled by the computer system.

263
Q

What are Permissions?

A

The type of access granted for a file or directory.

264
Q

What is Personally identifiable information (PII)?

A

Any information used to infer an individual’s identity.

265
Q

What is Phishing?

A

The use of digital communications to trick people into revealing sensitive data or deploying malicious software.

266
Q

What is a Phishing kit?

A

A collection of software tools needed to launch a phishing campaign.

267
Q

What is a Physical attack?

A

A security incident that affects not only digital but also physical environments where the incident is deployed.

268
Q

What is Physical social engineering?

A

An attack in which a threat actor impersonates an employee, customer, or vendor to obtain unauthorized access to a physical location.

269
Q

What is a Ping of death?

A

A type of DoS attack caused when a hacker pings a system by sending it an oversized ICMP packet that is bigger than 64KB.

270
Q

What is a Playbook?

A

A manual that provides details about any operational action.

271
Q

What is a Policy?

A

A set of rules that reduce risk and protect information.

272
Q

What is a Port?

A

A software-based location that organizes the sending and receiving of data between devices on a network.

273
Q

What is Port filtering?

A

A firewall function that blocks or allows certain port numbers to limit unwanted communication.

274
Q

What is Post-incident activity?

A

The process of reviewing an incident to identify areas for improvement during incident handling.

275
Q

What is a Potentially unwanted application (PUA)?

A

A type of unwanted software that is bundled in with legitimate programs which might display ads, cause device slowdown, or install other software.

276
Q

What is Private data?

A

Information that should be kept from the public.

277
Q

What does Prepare mean in the NIST RMF?

A

The first step of the NIST RMF related to activities that are necessary to manage security and privacy risks before a breach occurs.

278
Q

What is a Prepared statement?

A

A coding technique that executes SQL statements before passing them on to a database.

279
Q

What is a Primary key?

A

A column where every row has a unique entry.

280
Q

What is the Principle of least privilege?

A

The concept of granting only the minimal access and authorization required to complete a task or function.

281
Q

What is Privacy protection?

A

The act of safeguarding personal information from unauthorized use.

282
Q

What are Procedures?

A

Step-by-step instructions to perform a specific security task.

283
Q

What is the Process of Attack Simulation and Threat Analysis (PASTA)?

A

A popular threat modeling framework that’s used across many industries.

284
Q

What is Programming?

A

A process that can be used to create a specific set of instructions for a computer to execute tasks.

285
Q

What does Protect mean in the NIST RMF?

A

A NIST core function used to protect an organization through the implementation of policies, procedures, training, and tools that help mitigate cybersecurity threats.

286
Q

What is Protected health information (PHI)?

A

Information that relates to the past, present, or future physical or mental health or condition of an individual.

287
Q

What does Protecting and preserving evidence entail?

A

The process of properly working with fragile and volatile digital evidence.

288
Q

What is a Proxy server?

A

A server that fulfills the requests of its clients by forwarding them to other servers.

289
Q

What is Public data?

A

Data that is already accessible to the public and poses a minimal risk to the organization if viewed or shared by others.

290
Q

What is Public key infrastructure (PKI)?

A

An encryption framework that secures the exchange of online information.

291
Q

What is the Python Standard Library?

A

An extensive collection of Python code that often comes packaged with Python.

292
Q

What is a Query?

A

A request for data from a database table or a combination of tables.

293
Q

What does Quid pro quo mean?

A

A type of baiting used to trick someone into believing that they’ll be rewarded in return for sharing access, information, or money.

294
Q

What is a Rainbow table?

A

A file of pre-generated hash values and their associated plaintext.

295
Q

What is Random Access Memory (RAM)?

A

A hardware component used for short-term memory.

296
Q

What is Ransomware?

A

A malicious attack where threat actors encrypt an organization’s data and demand payment to restore access.

297
Q

What is Rapport?

A

A friendly relationship in which the people involved understand each other’s ideas and communicate well with each other.

298
Q

What does Recover mean in the NIST RMF?

A

A NIST core function related to returning affected systems back to normal operation.

299
Q

What is Recovery?

A

The process of returning affected systems back to normal operations.

300
Q

What is Red Hat® Enterprise Linux®?

A

A subscription-based distribution of Linux built for enterprise use.

301
Q

What is a Reflected XSS attack?

A

An instance when malicious script is sent to a server and activated during the server’s response.

302
Q

What is a Regular expression (regex)?

A

A sequence of characters that forms a pattern.

303
Q

What are Regulations?

A

Rules set by a government or other authority to control the way something is done.

304
Q

What is a Relational database?

A

A structured database containing tables that are related to each other.

305
Q

What is a Relative file path?

A

A file path that starts from the user’s current directory.

306
Q

What is a Replay attack?

A

A network attack performed when a malicious actor intercepts a data packet in transit and delays it or repeats it at another time.

307
Q

What is Resiliency?

A

The ability to prepare for, respond to, and recover from disruptions.

308
Q

What does Respond mean in the NIST RMF?

A

A NIST core function related to making sure that the proper procedures are used to contain, neutralize, and analyze security incidents, and implement improvements to the security process.

309
Q

What is a Return statement in Python?

A

A Python statement that executes inside a function and sends information back to the function call.

310
Q

What is a Reverse proxy server?

A

A server that regulates and restricts the internet’s access to an internal server.

311
Q

What is Risk?

A

Anything that can impact the confidentiality, integrity, or availability of an asset.

312
Q

What is Risk mitigation?

A

The process of having the right procedures and rules in place to quickly reduce the impact of a risk like a breach.

313
Q

What is a Root directory?

A

The highest-level directory in Linux.

314
Q

What is a Rootkit?

A

Malware that provides remote, administrative access to a computer.

315
Q

What is a Root user (or superuser)?

A

A user with elevated privileges to modify the system.

316
Q

What is a Router?

A

A network device that connects multiple networks together.

317
Q

What is Salting?

A

An additional safeguard that’s used to strengthen hash functions.

318
Q

What is Scareware?

A

Malware that employs tactics to frighten users into infecting their device.

319
Q

What is Search Processing Language (SPL)?

A

Splunk’s query language.

320
Q

What is Secure File Transfer Protocol (SFTP)?

A

A secure protocol used to transfer files from one device to another over a network.

321
Q

What is Secure shell (SSH)?

A

A security protocol used to create a shell with a remote system.

322
Q

What is Security architecture?

A

A type of security design composed of multiple components, such as tools and processes, that are used to protect an organization from risks and external threats.

323
Q

What is a Security audit?

A

A review of an organization’s security controls, policies, and procedures against a set of expectations.

324
Q

What are Security controls?

A

Safeguards designed to reduce specific security risks.

325
Q

What are Security ethics?

A

Guidelines for making appropriate decisions as a security professional.

326
Q

What are Security frameworks?

A

Guidelines used for building plans to help mitigate risk and threats to data and privacy.

327
Q

What is Security governance?

A

Practices that help support, define, and direct security efforts of an organization.

328
Q

What is Security hardening?

A

The process of strengthening a system to reduce its vulnerabilities and attack surface.

329
Q

What is Security information and event management (SIEM)?

A

An application that collects and analyzes log data to monitor critical activities in an organization.

330
Q

What is a Security mindset?

A

The ability to evaluate risk and constantly seek out and identify the potential or actual breach of a system, application, or data.

331
Q

What is a Security operations center (SOC)?

A

An organizational unit dedicated to monitoring networks, systems, and devices for security threats or attacks.

332
Q

What is Security orchestration, automation, and response (SOAR)?

A

A collection of applications, tools, and workflows that use automation to respond to security events.

333
Q

What is a Security posture?

A

An organization’s ability to manage its defense of critical assets and data and react to change.

334
Q

What is a Security zone?

A

A segment of a company’s network that protects the internal network from the internet.

335
Q

What does Select mean in the NIST RMF?

A

The third step of the NIST RMF that means to choose, customize, and capture documentation of the controls that protect an organization.

336
Q

What is Sensitive data?

A

A type of data that includes personally identifiable information (PII), sensitive personally identifiable information (SPII), or protected health information (PHI).

337
Q

What is Sensitive personally identifiable information (SPII)?

A

A specific type of PII that falls under stricter handling guidelines.

338
Q

What is Separation of duties?

A

The principle that users should not be given levels of authorization that would allow them to misuse a system.

339
Q

What is a Session?

A

A sequence of network HTTP requests and responses associated with the same user.

340
Q

What is a Session cookie?

A

A token that websites use to validate a session and determine how long that session should last.

341
Q

What is Session hijacking?

A

An event when attackers obtain a legitimate user’s session ID.

342
Q

What is a Session ID?

A

A unique token that identifies a user and their device while accessing a system.

343
Q

What is Set data?

A

Data that consists of an unordered collection of unique values.

344
Q

What is Shared responsibility?

A

The idea that all individuals within an organization take an active role in lowering risk and maintaining both physical and virtual security.

345
Q

What is a Shell?

A

The command-line interpreter.

346
Q

What is a Signature?

A

A pattern that is associated with malicious activity.

347
Q

What is Signature analysis?

A

A detection method used to find events of interest.

348
Q

What is Simple Network Management Protocol (SNMP)?

A

A network protocol used for monitoring and managing devices on a network.

349
Q

What is Single sign-on (SSO)?

A

A technology that combines several different logins into one.

350
Q

What is Smishing?

A

The use of text messages to trick users to obtain sensitive information or to impersonate a known source.

351
Q

What is a Smurf attack?

A

A network attack performed when an attacker sniffs an authorized user’s IP address and floods it with ICMP packets.

352
Q

What is Social engineering?

A

A manipulation technique that exploits human error to gain private information, access, or valuables.

353
Q

What is Social media phishing?

A

A type of attack where a threat actor collects detailed information about their target on social media sites before initiating the attack.

354
Q

What is Spear phishing?

A

A malicious email attack targeting a specific user or group of users, appearing to originate from a trusted source.

355
Q

What is Speed in networking?

A

The rate at which a device sends and receives data, measured by bits per second.

356
Q

What is Splunk Cloud?

A

A cloud-hosted tool used to collect, search, and monitor log data.

357
Q

What is Splunk Enterprise?

A

A self-hosted tool used to retain, analyze, and search an organization’s log data to provide security information and alerts in real-time.

358
Q

What is Spyware?

A

Malware that’s used to gather and sell information without consent.

359
Q

What is SQL (Structured Query Language)?

A

A programming language used to create, interact with, and request information from a database.

360
Q

What is SQL injection?

A

An attack that executes unexpected queries on a database.

361
Q

What is a Stakeholder?

A

An individual or group that has an interest in any decision or activity of an organization.

362
Q

What is Standard error?

A

An error message returned by the OS through the shell.

363
Q

What is Standard input?

A

Information received by the OS via the command line.

364
Q

What is Standard output?

A

Information returned by the OS through the shell.

365
Q

What are Standards?

A

References that inform how to set policies.

366
Q

What is the STAR method?

A

An interview technique used to answer behavioral and situational questions.

367
Q

What is Stateful?

A

A class of firewall that keeps track of information passing through it and proactively filters out threats.

368
Q

What is a Stateless firewall?

A

A class of firewall that operates based on predefined rules and that does not keep track of information from data packets.

369
Q

What is a Stored XSS attack?

A

An instance when malicious script is injected directly on the server.

370
Q

What is String concatenation?

A

The process of joining two strings together.

371
Q

What is String data?

A

Data consisting of an ordered sequence of characters.

372
Q

What is a Style guide?

A

A manual that informs the writing, formatting, and design of documents.

373
Q

What is Subnetting?

A

The subdivision of a network into logical groups called subnets.

374
Q

What is a Substring?

A

A continuous sequence of characters within a string.

375
Q

What is Sudo?

A

A command that temporarily grants elevated permissions to specific users.

376
Q

What is a Supply-chain attack?

A

An attack that targets systems, applications, hardware, and/or software to locate a vulnerability where malware can be deployed.

377
Q

What is Suricata?

A

An open-source intrusion detection system, intrusion prevention system, and network analysis tool.

378
Q

What is a Switch?

A

A device that makes connections between specific devices on a network by sending and receiving data between them.

379
Q

What is Symmetric encryption?

A

The use of a single secret key to exchange information.

380
Q

What is a Synchronize (SYN) flood attack?

A

A type of DoS attack that simulates a TCP/IP connection and floods a server with SYN packets.

381
Q

What is Syntax?

A

The rules that determine what is correctly structured in a computing language.

382
Q

What is a Syntax error?

A

An error that involves invalid usage of a programming language.

383
Q

What is Tailgating?

A

A social engineering tactic in which unauthorized people follow an authorized person into a restricted area.

384
Q

What is the TCP/IP model?

A

A framework used to visualize how data is organized and transmitted across a network.

385
Q

What is tcpdump?

A

A command-line network protocol analyzer.

386
Q

What are Technical skills?

A

Skills that require knowledge of specific tools, procedures, and policies.

387
Q

What is Telemetry?

A

The collection and transmission of data for analysis.

388
Q

What is a Threat?

A

Any circumstance or event that can negatively impact assets.

389
Q

What is a Threat actor?

A

Any person or group who presents a security risk.

390
Q

What is Threat hunting?

A

The proactive search for threats on a network.

391
Q

What is Threat intelligence?

A

Evidence-based threat information that provides context about existing or emerging threats.

392
Q

What is Threat modeling?

A

The process of identifying assets, their vulnerabilities, and how each is exposed to threats.

393
Q

What are Transferable skills?

A

Skills from other areas that can apply to different careers.

394
Q

What is Transmission Control Protocol (TCP)?

A

An internet communication protocol that allows two devices to form a connection and stream data.

395
Q

What is Triage?

A

The prioritizing of incidents according to their level of importance or urgency.

396
Q

What is a Trojan horse?

A

Malware that looks like a legitimate file or program.

397
Q

What is a True negative?

A

A state where there is no detection of malicious activity.

398
Q

What is a True positive?

A

An alert that correctly detects the presence of an attack.

399
Q

What is Tuple data?

A

Data structure that consists of a collection of data that cannot be changed.

400
Q

What is a Type error?

A

An error that results from using the wrong data type.

401
Q

What is Ubuntu?

A

An open-source, user-friendly distribution that is widely used in security and other industries.

402
Q

What is Unauthorized access?

A

An incident type that occurs when an individual gains digital or physical access to a system or application without permission.

403
Q

What is an Uncontrolled zone?

A

Any network outside your organization’s control.

404
Q

What is Unified Extensible Firmware Interface (UEFI)?

A

A microchip that contains loading instructions for the computer and replaces BIOS on more modern systems.

405
Q

What is USB baiting?

A

An attack in which a threat actor strategically leaves a malware USB stick for an employee to find and install to unknowingly infect a network.

406
Q

What is a User?

A

The person interacting with a computer.

407
Q

What is User Datagram Protocol (UDP)?

A

A connectionless protocol that does not establish a connection between devices before transmissions.

408
Q

What is a User-defined function?

A

A function that programmers design for their specific needs.

409
Q

What is unauthorized access?

A

Access to a system or application without permission

410
Q

What is an uncontrolled zone?

A

Any network outside your organization’s control

411
Q

What does UEFI stand for?

A

Unified Extensible Firmware Interface: A microchip that contains loading instructions for the computer and replaces BIOS on more modern systems

412
Q

What is USB baiting?

A

An attack in which a threat actor strategically leaves a malware USB stick for an employee to find and install to unknowingly infect a network

413
Q

Who is a user?

A

The person interacting with a computer

414
Q

What is User Datagram Protocol (UDP)?

A

A connectionless protocol that does not establish a connection between devices before transmissions

415
Q

What is a user-defined function?

A

A function that programmers design for their specific needs

416
Q

What is a user interface?

A

A program that allows the user to control the functions of the operating system

417
Q

What is user provisioning?

A

The process of creating and maintaining a user’s digital identity

418
Q

What is a variable?

A

A container that stores data

419
Q

What is a virtual machine (VM)?

A

A virtual version of a physical computer

420
Q

What is a Virtual Private Network (VPN)?

A

A network security service that changes your public IP address and hides your virtual location so that you can keep your data private when you are using a public network like the internet

421
Q

What is a virus?

A

Malicious code written to interfere with computer operations and cause damage to data and software

422
Q

What is VirusTotal?

A

A service that allows anyone to analyze suspicious files, domains, URLs, and IP addresses for malicious content

423
Q

What is vishing?

A

The exploitation of electronic voice communication to obtain sensitive information or to impersonate a known source

424
Q

What is a visual dashboard?

A

A way of displaying various types of data quickly in one place

425
Q

What is a vulnerability?

A

A weakness that can be exploited by a threat

426
Q

What is a vulnerability assessment?

A

The internal review process of an organization’s security systems

427
Q

What is vulnerability management?

A

The process of finding and patching vulnerabilities

428
Q

What is a vulnerability scanner?

A

Software that automatically compares existing common vulnerabilities and exposures against the technologies on the network.

429
Q

What is a watering hole attack?

A

A type of attack when a threat actor compromises a website frequently visited by a specific group of users

430
Q

What are web-based exploits?

A

Malicious code or behavior that’s used to take advantage of coding flaws in a web application

431
Q

What is whaling?

A

A category of spear phishing attempts that are aimed at high-ranking executives in an organization

432
Q

What is a Wide Area Network (WAN)?

A

A network that spans a large geographic area like a city, state, or country

433
Q

What is Wi-Fi Protected Access (WPA)?

A

A wireless security protocol for devices to connect to the internet

434
Q

What is a wildcard?

A

A special character that can be substituted with any other character

435
Q

What is Wireshark?

A

An open-source network protocol analyzer

436
Q

What is a world-writable file?

A

A file that can be altered by anyone in the world

437
Q

What is a worm?

A

Malware that can duplicate and spread itself across systems on its own

438
Q

What is YARA-L?

A

A computer language used to create rules for searching through ingested log data

439
Q

What is a zero-day?

A

An exploit that was previously unknown