Cybersecurity Flashcards

1
Q

Absolute file path

A

The full file path, which starts from the root

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Access controls

A

Security controls that manage access, authorization, and accountability of information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Active packet sniffing

A

A type of attack where data packets are manipulated in transit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Address Resolution Protocol (ARP)

A

A network protocol used to determine the MAC address of the next router or device on the path

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Advanced persistent threat (APT)

A

An instance when a threat actor maintains unauthorized access to a system for an extended period of time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Adversarial artificial intelligence (AI)

A

A technique that manipulates artificial intelligence (AI) and machine learning (ML) technology to conduct attacks more efficiently

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Adware

A

A type of legitimate software that is sometimes used to display digital advertisements in applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Algorithm

A

A set of rules used to solve a problem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Analysis

A

The investigation and validation of alerts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Angler phishing

A

A technique where attackers impersonate customer service representatives on social media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Anomaly-based analysis

A

A detection method that identifies abnormal behavior

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Antivirus software

A

A software program used to prevent, detect, and eliminate malware and viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Application

A

A program that performs a specific task

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Application programming interface (API) token

A

A small block of encrypted code that contains information about a user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Argument (Linux)

A

Specific information needed by a command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Argument (Python)

A

The data brought into a function when it is called

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Array

A

A data type that stores data in a comma-separated ordered list

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Assess

A

The fifth step of the NIST RMF that means to determine if established controls are implemented correctly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Asset

A

An item perceived as having value to an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Asset classification

A

The practice of labeling assets based on sensitivity and importance to an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Asset inventory

A

A catalog of assets that need to be protected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Asset management

A

The process of tracking assets and the risks that affect them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Asymmetric encryption

A

The use of a public and private key pair for encryption and decryption of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Attack surface

A

All the potential vulnerabilities that a threat actor could exploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Attack tree

A

A diagram that maps threats to assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Attack vectors

A

The pathways attackers use to penetrate security defenses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Authentication

A

The process of verifying who someone is

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Authorization

A

The concept of granting access to specific resources in a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Authorize

A

The sixth step of the NIST RMF that refers to being accountable for the security and privacy risks that might exist in an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Automation

A

The use of technology to reduce human and manual effort to perform common and repetitive tasks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Availability

A

The idea that data is accessible to those who are authorized to access it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Baiting

A

A social engineering tactic that tempts people into compromising their security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Bandwidth

A

The maximum data transmission capacity over a network, measured by bits per second

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Baseline configuration (baseline image)

A

A documented set of specifications within a system that is used as a basis for future builds, releases, and updates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Bash

A

The default shell in most Linux distributions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Basic auth

A

The technology used to establish a user’s request to access a server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Basic Input/Output System (BIOS)

A

A microchip that contains loading instructions for the computer and is prevalent in older systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Biometrics

A

The unique physical characteristics that can be used to verify a person’s identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Bit

A

The smallest unit of data measurement on a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Boolean data

A

Data that can only be one of two values: either True or False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Bootloader

A

A software program that boots the operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Botnet

A

A collection of computers infected by malware that are under the control of a single threat actor, known as the “bot-herder”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Bracket notation

A

The indices placed in square brackets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Broken chain of custody

A

Inconsistencies in the collection and logging of evidence in the chain of custody

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Brute force attack

A

The trial and error process of discovering private information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Bug bounty

A

Programs that encourage freelance hackers to find and report vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Built-in function

A

A function that exists within Python and can be called directly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Business continuity

A

An organization’s ability to maintain their everyday productivity by establishing risk disaster recovery plans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Business continuity plan (BCP)

A

A document that outlines the procedures to sustain business operations during and after a significant disruption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Business Email Compromise (BEC)

A

A type of phishing attack where a threat actor impersonates a known source to obtain financial advantage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Categorize

A

The second step of the NIST RMF that is used to develop risk management processes and tasks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

CentOS

A

An open-source distribution that is closely related to Red Hat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Central Processing Unit (CPU)

A

A computer’s main processor, which is used to perform general computing tasks on a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Chain of custody

A

The process of documenting evidence possession and control during an incident lifecycle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Chronicle

A

A cloud-native tool designed to retain, analyze, and search data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Cipher

A

An algorithm that encrypts information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Cloud-based firewalls

A

Software firewalls that are hosted by the cloud service provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Cloud computing

A

The practice of using remote servers, applications, and network services that are hosted on the internet instead of on local physical devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Cloud network

A

A collection of servers or computers that stores resources and data in remote data centers that can be accessed via the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Cloud security:

A

The process of ensuring that assets stored in the cloud are properly configured and access to those assets is limited to authorized users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Command

A

An instruction telling the computer to do something

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Command and control (C2)

A

The techniques used by malicious actors to maintain communications with compromised systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Command-line interface (CLI)

A

A text-based user interface that uses commands to interact with the computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

Comment

A

A note programmers make about the intention behind their code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

Common Event Format (CEF)

A

A log format that uses key-value pairs to structure data and identify fields and their corresponding values

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

Common Vulnerabilities and Exposures (CVE®) list

A

An openly accessible dictionary of known vulnerabilities and exposures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

Common Vulnerability Scoring System (CVSS)

A

A measurement system that scores the severity of a vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

Compliance

A

The process of adhering to internal standards and external regulations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

Computer security incident response teams (CSIRT)

A

A specialized group of security professionals that are trained in incident management and response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

Computer virus

A

Malicious code written to interfere with computer operations and cause damage to data and software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

Conditional statement

A

A statement that evaluates code to determine if it meets a specified set of conditions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

Confidentiality

A

The idea that only authorized users can access specific assets or data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

Confidential data:

A

Data that often has limits on the number of people who have access to it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

Confidentiality, integrity, availability (CIA) triad

A

A model that helps inform how organizations consider risk when setting up systems and security policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

Configuration file

A

A file used to configure the settings of an application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

Containment

A

The act of limiting and preventing additional damage caused by an incident

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

Controlled zone

A

A subnet that protects the internal network from the uncontrolled zone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

Cross-site scripting (XSS)

A

An injection attack that inserts code into a vulnerable website or web application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

Crowdsourcing

A

The practice of gathering information using public input and collaboration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

Cryptographic attack

A

An attack that affects secure forms of communication between a sender and intended recipient

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

Cryptographic key

A

A mechanism that decrypts ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

Cryptography

A

The process of transforming information into a form that unintended readers can’t understand

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

Cryptojacking

A

A form of malware that installs software to illegally mine cryptocurrencies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

CVE Numbering Authority (CNA)

A

An organization that volunteers to analyze and distribute information on eligible CVEs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

Cybersecurity (or security)

A

The practice of ensuring confidentiality, integrity, and availability of information by protecting networks, devices, people, and data from unauthorized access or criminal exploitation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

Data

A

Information that is translated, processed, or stored by a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

Data at rest

A

Data not currently being accessed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

Database

A

An organized collection of information or data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

Data controller

A

A person that determines the procedure and purpose for processing data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

Data custodian

A

Anyone or anything that’s responsible for the safe handling, transport, and storage of information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

Data exfiltration

A

Unauthorized transmission of data from a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

Data in transit

A

Data traveling from one point to another

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

Data in use

A

Data being accessed by one or more users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

Data owner

A

The person who decides who can access, edit, use, or destroy their information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

Data packet

A

A basic unit of information that travels from one device to another within a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

Data point

A

A specific piece of information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

Data processor

A

A person that is responsible for processing data on behalf of the data controller

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

Data protection officer (DPO)

A

An individual that is responsible for monitoring the compliance of an organization’s data protection procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

Data type

A

A category for a particular type of data item

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

Date and time data

A

Data representing a date and/or time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

Debugger

A

A software tool that helps to locate the source of an error and assess its causes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

Debugging

A

The practice of identifying and fixing errors in code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

Defense in depth

A

A layered approach to vulnerability management that reduces risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

Denial of service (DoS) attack

A

An attack that targets a network or server and floods it with network traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

Detect

A

A NIST core function related to identifying potential security incidents and improving monitoring capabilities to increase the speed and efficiency of detections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q

Detection

A

The prompt discovery of security events

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q

Dictionary data

A

Data that consists of one or more key-value pairs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
108
Q

Digital certificate

A

A file that verifies the identity of a public key holder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
109
Q

Digital forensics

A

The practice of collecting and analyzing data to determine what has happened after an attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
110
Q

Directory

A

A file that organizes where other files are stored

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
111
Q

Disaster recovery plan:

A

A plan that allows an organization’s security team to outline the steps needed to minimize the impact of a security incident

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
112
Q

Distributed denial of service (DDoS) attack

A

A type of denial of service attack that uses multiple devices or servers located in different locations to flood the target network with unwanted traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
113
Q

Distributions

A

The different versions of Linux

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
114
Q

Documentation

A

Any form of recorded content that is used for a specific purpose

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
115
Q

DOM-based XSS attack

A

An instance when malicious script exists in the webpage a browser loads

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
116
Q

Domain Name System (DNS)

A

A networking protocol that translates internet domain names into IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
117
Q

Dropper

A

A type of malware that comes packed with malicious code which is delivered and installed onto a target system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
118
Q

Elevator pitch

A

A brief summary of your experience, skills, and background

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
119
Q

Encapsulation

A

A process performed by a VPN service that protects your data by wrapping sensitive data in other data packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
120
Q

Encryption

A

The process of converting data from a readable format to an encoded format

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
121
Q

Endpoint

A

Any device connected on a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
122
Q

Endpoint detection and response (EDR)

A

An application that monitors an endpoint for malicious activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
123
Q

Eradication

A

The complete removal of the incident elements from all affected systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
124
Q

Escalation policy

A

A set of actions that outline who should be notified when an incident alert occurs and how that incident should be handled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
125
Q

Event

A

An observable occurrence on a network, system, or device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
126
Q

Exception

A

An error that involves code that cannot be executed even though it is syntactically correct

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
127
Q

Exclusive operator

A

An operator that does not include the value of comparison

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
128
Q

Exploit

A

A way of taking advantage of a vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
129
Q

Exposure

A

A mistake that can be exploited by a threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
130
Q

External threat

A

Anything outside the organization that has the potential to harm organizational assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
131
Q

False negative

A

A state where the presence of a threat is not detected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
132
Q

False positive

A

An alert that incorrectly detects the presence of a threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
133
Q

Fileless malware

A

Malware that does not need to be installed by the user because it uses legitimate programs that are already installed to infect a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
134
Q

File path

A

The location of a file or directory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
135
Q

Filesystem Hierarchy Standard (FHS)

A

The component of the Linux OS that organizes data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
136
Q

Filtering

A

Selecting data that match a certain condition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
137
Q

Final report

A

Documentation that provides a comprehensive review of an incident

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
138
Q

Firewall

A

A network security device that monitors traffic to or from a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
139
Q

Float data

A

Data consisting of a number with a decimal point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
140
Q

Foreign key

A

A column in a table that is a primary key in another table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
141
Q

Forward proxy server

A

A server that regulates and restricts a person’s access to the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
142
Q

Function

A

A section of code that can be reused in a program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
143
Q

Global variable

A

A variable that is available through the entire program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
144
Q

Graphical user interface (GUI)

A

A user interface that uses icons on the screen to manage different tasks on the computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
145
Q

Hacker

A

Any person who uses computers to gain access to computer systems, networks, or data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
146
Q

Hacktivist

A

A person who uses hacking to achieve a political goal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
147
Q

Hard drive

A

A hardware component used for long-term memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
148
Q

Hardware

A

The physical components of a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
149
Q

Hash collision

A

An instance when different inputs produce the same hash value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
150
Q

Hash function

A

An algorithm that produces a code that can’t be decrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
151
Q

Hash table

A

A data structure that’s used to store and reference hash values

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
152
Q

Health Insurance Portability and Accountability Act (HIPAA)

A

A U.S. federal law established to protect patients’ health information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
153
Q

Honeypot

A

A system or resource created as a decoy vulnerable to attacks with the purpose of attracting potential intruders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
154
Q

Host-based intrusion detection system (HIDS)

A

An application that monitors the activity of the host on which it’s installed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
155
Q

Hub

A

A network device that broadcasts information to every device on the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
156
Q

Hypertext Transfer Protocol (HTTP)

A

An application layer protocol that provides a method of communication between clients and website servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
157
Q

Hypertext Transfer Protocol Secure (HTTPS):

A

A network protocol that provides a secure method of communication between clients and website servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
158
Q

Identify

A

A NIST core function related to management of cybersecurity risk and its effect on an organization’s people and assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
159
Q

Identity and access management (IAM)

A

A collection of processes and technologies that helps organizations manage digital identities in their environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
160
Q

IEEE 802.11 (Wi-Fi)

A

A set of standards that define communication for wireless LANs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
161
Q

Immutable

A

An object that cannot be changed after it is created and assigned a value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
162
Q

Implement

A

The fourth step of the NIST RMF that means to implement security and privacy plans for an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
163
Q

Improper usage

A

An incident type that occurs when an employee of an organization violates the organization’s acceptable use policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
164
Q

Incident

A

An occurrence that actually or imminently jeopardizes, without lawful authority, the confidentiality, integrity, or availability of information or an information system; or constitutes a violation or imminent threat of violation of law, security policies, security procedures, or acceptable use policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
165
Q

Incident escalation

A

The process of identifying a potential security incident, triaging it, and handing it off to a more experienced team member

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
166
Q

Incident handler’s journal

A

A form of documentation used in incident response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
167
Q

Incident response:

A

An organization’s quick attempt to identify an attack, contain the damage, and correct the effects of a security breach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
168
Q

Incident response plan

A

A document that outlines the procedures to take in each step of incident response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
169
Q

Inclusive operator

A

An operator that includes the value of comparison

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
170
Q

Indentation

A

Space added at the beginning of a line of code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
171
Q

Index

A

A number assigned to every element in a sequence that indicates its position

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
172
Q

Indicators of attack (IoA)

A

The series of observed events that indicate a real-time incident

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
173
Q

Indicators of compromise (IoC)

A

Observable evidence that suggests signs of a potential security incident

174
Q

Information privacy

A

The protection of unauthorized access and distribution of data

175
Q

Information security (InfoSec)

A

The practice of keeping data in all states away from unauthorized users

176
Q

Injection attack

A

Malicious code inserted into a vulnerable application

177
Q

Input validation

A

Programming that validates inputs from users and other programs

178
Q

Integer data

A

Data consisting of a number that does not include a decimal point

179
Q

Integrated development environment (IDE)

A

A software application for writing code that provides editing assistance and error correction tools

180
Q

Integrity

A

The idea that the data is correct, authentic, and reliable

181
Q

Internal hardware

A

The components required to run the computer

182
Q

Internal threat

A

A current or former employee, external vendor, or trusted partner who poses a security risk

183
Q

Internet Control Message Protocol (ICMP)

A

An internet protocol used by devices to tell each other about data transmission errors across the network

184
Q

Internet Control Message Protocol flood (ICMP flood)

A

A type of DoS attack performed by an attacker repeatedly sending ICMP request packets to a network server

185
Q

Internet Protocol (IP)

A

A set of standards used for routing and addressing data packets as they travel between devices on a network

186
Q

Internet Protocol (IP) address

A

A unique string of characters that identifies the location of a device on the internet

187
Q

Interpreter

A

A computer program that translates Python code into runnable instructions line by line

188
Q

Intrusion detection system (IDS)

A

An application that monitors system activity and alerts on possible intrusions

189
Q

Intrusion prevention system (IPS)

A

An application that monitors system activity for intrusive activity and takes action to stop the activity

190
Q

IP spoofing

A

A network attack performed when an attacker changes the source IP of a data packet to impersonate an authorized system and gain access to a network

191
Q

Iterative statement

A

Code that repeatedly executes a set of instructions

192
Q

KALI LINUX ™

A

An open-source distribution of Linux that is widely used in the security industry

193
Q

Kernel

A

The component of the Linux OS that manages processes and memory

194
Q

Key-value pair

A

A set of data that represents two linked items: a key, and its corresponding value

195
Q

Legacy operating system

A

An operating system that is outdated but still being used

196
Q

Lessons learned meeting

A

A meeting that includes all involved parties after a major incident

197
Q

Library

A

A collection of modules that provide code users can access in their programs

198
Q

Linux

A

An open-source operating system

199
Q

List concatenation

A

The concept of combining two lists into one by placing the elements of the second list directly after the elements of the first list

200
Q

List data

A

Data structure that consists of a collection of data in sequential form

201
Q

Loader

A

A type of malware that downloads strains of malicious code from an external source and installs them onto a target system

202
Q

Local Area Network (LAN)

A

A network that spans small areas like an office building, a school, or a home

203
Q

Local variable

A

A variable assigned within a function

204
Q

Log

A

A record of events that occur within an organization’s systems

205
Q

Log analysis

A

The process of examining logs to identify events of interest

206
Q

Logging

A

The recording of events occurring on computer systems and networks

207
Q

Logic error

A

An error that results when the logic used in code produces unintended results

208
Q

Log management

A

The process of collecting, storing, analyzing, and disposing of log data

209
Q

Loop condition

A

The part of a loop that determines when the loop terminates

210
Q

Loop variable

A

A variable that is used to control the iterations of a loop

211
Q

Malware

A

Software designed to harm devices or networks

212
Q

Malware infection

A

An incident type that occurs when malicious software designed to disrupt a system infiltrates an organization’s computers or network

213
Q

Media Access Control (MAC) address

A

A unique alphanumeric identifier that is assigned to each physical device on a network

214
Q

Method

A

A function that belongs to a specific data type

215
Q

Metrics

A

Key technical attributes such as response time, availability, and failure rate, which are used to assess the performance of a software application

216
Q

MITRE

A

A collection of non-profit research and development centers

217
Q

Modem

A

A device that connects your router to the internet and brings internet access to the LAN

218
Q

Module

A

A Python file that contains additional functions, variables, classes, and any kind of runnable code

219
Q

Monitor

A

The seventh step of the NIST RMF that means be aware of how systems are operating

220
Q

Multi-factor authentication (MFA)

A

A security measure that requires a user to verify their identity in two or more ways to access a system or network

221
Q

nano

A

A command-line file editor that is available by default in many Linux distributions

222
Q

National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF)

A

A voluntary framework that consists of standards, guidelines, and best practices to manage cybersecurity risk

223
Q

National Institute of Standards and Technology (NIST) Incident Response Lifecycle

A

A framework for incident response consisting of four phases: Preparation; Detection and Analysis; Containment, Eradication and Recovery, and Post-incident activity

224
Q

National Institute of Standards and Technology (NIST) Special Publication (S.P.) 800-53

A

A unified framework for protecting the security of information systems within the U.S. federal government

225
Q

Network

A

A group of connected devices

226
Q

Network-based intrusion detection system (NIDS)

A

An application that collects and monitors network traffic and network data

227
Q

Network data

A

The data that’s transmitted between devices on a network

228
Q

Network Interface Card (NIC)

A

Hardware that connects computers to a network

229
Q

Network log analysis

A

The process of examining network logs to identify events of interest

230
Q

Network protocol analyzer (packet sniffer)

A

A tool designed to capture and analyze data traffic within a network

231
Q

Network protocols

A

A set of rules used by two or more devices on a network to describe the order of delivery and the structure of data

232
Q

Network security

A

The practice of keeping an organization’s network infrastructure secure from unauthorized access

233
Q

Network segmentation

A

A security technique that divides the network into segments

234
Q

Network traffic

A

The amount of data that moves across a network

235
Q

Non-repudiation

A

The concept that the authenticity of information can’t be denied

236
Q

Notebook

A

An online interface for writing, storing, and running code

237
Q

Numeric data

A

Data consisting of numbers

238
Q

OAuth

A

An open-standard authorization protocol that shares designated access between applications

239
Q

Object

A

A data type that stores data in a comma-separated list of key-value pairs

240
Q

On-path attack

A

An attack where a malicious actor places themselves in the middle of an authorized connection and intercepts or alters the data in transit

241
Q

Open-source intelligence (OSINT)

A

The collection and analysis of information from publicly available sources to generate usable intelligence

242
Q

Open systems interconnection (OSI) model

A

A standardized concept that describes the seven layers computers use to communicate and send data over the network

243
Q

Open Web Application Security Project/Open Worldwide Application Security Project (OWASP)

A

A non-profit organization focused on improving software security

244
Q

Operating system (OS)

A

The interface between computer hardware and the user

245
Q

Operator

A

A symbol or keyword that represents an operation

246
Q

Options

A

Input that modifies the behavior of a command

247
Q

Order of volatility

A

A sequence outlining the order of data that must be preserved from first to last

248
Q

OWASP Top 10

A

A globally recognized standard awareness document that lists the top 10 most critical security risks to web applications

249
Q

Package

A

A piece of software that can be combined with other packages to form an application

250
Q

Package manager

A

A tool that helps users install, manage, and remove packages or applications

251
Q

Packet capture (P-cap)

A

A file containing data packets intercepted from an interface or network

252
Q

Packet sniffing

A

The practice of capturing and inspecting data packets across a network

253
Q

Parameter (Python)

A

An object that is included in a function definition for use in that function

254
Q

Parrot

A

An open-source distribution that is commonly used for security

255
Q

Parsing

A

The process of converting data into a more readable format

256
Q

Passive packet sniffing

A

A type of attack where a malicious actor connects to a network hub and looks at all traffic on the network

257
Q

Password attack

A

An attempt to access password secured devices, systems, networks, or data

258
Q

Patch update

A

A software and operating system update that addresses security vulnerabilities within a program or product

259
Q

Payment Card Industry Data Security Standards (PCI DSS)

A

A set of security standards formed by major organizations in the financial industry

260
Q

Penetration test (pen test)

A

A simulated attack that helps identify vulnerabilities in systems, networks, websites, applications, and processes

261
Q

PEP 8 style guide

A

A resource that provides stylistic guidelines for programmers working in Python

262
Q

Peripheral devices

A

Hardware components that are attached and controlled by the computer system

263
Q

Permissions

A

The type of access granted for a file or directory

264
Q

Personally identifiable information (PII)

A

Any information used to infer an individual’s identity

265
Q

Phishing

A

The use of digital communications to trick people into revealing sensitive data or deploying malicious software

266
Q

Phishing kit

A

A collection of software tools needed to launch a phishing campaign

267
Q

Physical attack

A

A security incident that affects not only digital but also physical environments where the incident is deployed

268
Q

Physical social engineering

A

An attack in which a threat actor impersonates an employee, customer, or vendor to obtain unauthorized access to a physical location

269
Q

Ping of death

A

A type of DoS attack caused when a hacker pings a system by sending it an oversized ICMP packet that is bigger than 64KB

270
Q

Playbook

A

A manual that provides details about any operational action

271
Q

Policy

A

A set of rules that reduce risk and protect information

272
Q

Port

A

A software-based location that organizes the sending and receiving of data between devices on a network

273
Q

Port filtering

A

A firewall function that blocks or allows certain port numbers to limit unwanted communication

274
Q

Post-incident activity

A

The process of reviewing an incident to identify areas for improvement during incident handling

275
Q

Potentially unwanted application (PUA)

A

A type of unwanted software that is bundled in with legitimate programs which might display ads, cause device slowdown, or install other software

276
Q

Private data

A

Information that should be kept from the public

277
Q

Prepare

A

The first step of the NIST RMF related to activities that are necessary to manage security and privacy risks before a breach occurs

278
Q

Prepared statement:

A

A coding technique that executes SQL statements before passing them on to a database

279
Q

Primary key

A

A column where every row has a unique entry

280
Q

Principle of least privilege

A

The concept of granting only the minimal access and authorization required to complete a task or function

281
Q

Privacy protection

A

The act of safeguarding personal information from unauthorized use

282
Q

Procedures

A

Step-by-step instructions to perform a specific security task

283
Q

Process of Attack Simulation and Threat Analysis (PASTA):

A

A popular threat modeling framework that’s used across many industries

284
Q

Programming

A

A process that can be used to create a specific set of instructions for a computer to execute tasks

285
Q

Protect

A

A NIST core function used to protect an organization through the implementation of policies, procedures, training, and tools that help mitigate cybersecurity threats

286
Q

Protected health information (PHI)

A

Information that relates to the past, present, or future physical or mental health or condition of an individual

287
Q

Protecting and preserving evidence

A

The process of properly working with fragile and volatile digital evidence

288
Q

Proxy server

A

A server that fulfills the requests of its clients by forwarding them to other servers

289
Q

Public data

A

Data that is already accessible to the public and poses a minimal risk to the organization if viewed or shared by others

290
Q

Public key infrastructure (PKI)

A

An encryption framework that secures the exchange of online information

291
Q

Python Standard Library

A

An extensive collection of Python code that often comes packaged with Python

292
Q

Query

A

A request for data from a database table or a combination of tables

293
Q

Quid pro quo

A

A type of baiting used to trick someone into believing that they’ll be rewarded in return for sharing access, information, or money

294
Q

Rainbow table

A

A file of pre-generated hash values and their associated plaintext

295
Q

Random Access Memory (RAM)

A

A hardware component used for short-term memory

296
Q

Ransomware

A

A malicious attack where threat actors encrypt an organization’s data and demand payment to restore access

297
Q

Rapport

A

A friendly relationship in which the people involved understand each other’s ideas and communicate well with each other

298
Q

Recover

A

A NIST core function related to returning affected systems back to normal operation

299
Q

Recovery

A

The process of returning affected systems back to normal operations

300
Q

Red Hat® Enterprise Linux®

A

A subscription-based distribution of Linux built for enterprise use

301
Q

Reflected XSS attack

A

An instance when malicious script is sent to a server and activated during the server’s response

302
Q

Regular expression (regex)

A

A sequence of characters that forms a pattern

303
Q

Regulations

A

Rules set by a government or other authority to control the way something is done

304
Q

Relational database

A

A structured database containing tables that are related to each other

305
Q

Relative file path

A

A file path that starts from the user’s current directory

306
Q

Replay attack

A

A network attack performed when a malicious actor intercepts a data packet in transit and delays it or repeats it at another time

307
Q

Resiliency

A

The ability to prepare for, respond to, and recover from disruptions

308
Q

Respond

A

A NIST core function related to making sure that the proper procedures are used to contain, neutralize, and analyze security incidents, and implement improvements to the security process

309
Q

Return statement

A

A Python statement that executes inside a function and sends information back to the function call

310
Q

Reverse proxy server

A

A server that regulates and restricts the internet’s access to an internal server

311
Q

Risk

A

Anything that can impact the confidentiality, integrity, or availability of an asset

312
Q

Risk mitigation

A

The process of having the right procedures and rules in place to quickly reduce the impact of a risk like a breach

313
Q

Root directory

A

The highest-level directory in Linux

314
Q

Rootkit

A

Malware that provides remote, administrative access to a computer

315
Q

Root user (or superuser)

A

A user with elevated privileges to modify the system

316
Q

Router

A

A network device that connects multiple networks together

317
Q

Salting

A

An additional safeguard that’s used to strengthen hash functions

318
Q

Scareware

A

Malware that employs tactics to frighten users into infecting their device

319
Q

Search Processing Language (SPL)

A

Splunk’s query language

320
Q

Secure File Transfer Protocol (SFTP)

A

A secure protocol used to transfer files from one device to another over a network

321
Q

Secure shell (SSH)

A

A security protocol used to create a shell with a remote system

322
Q

Security architecture

A

A type of security design composed of multiple components, such as tools and processes, that are used to protect an organization from risks and external threats

323
Q

Security audit

A

A review of an organization’s security controls, policies, and procedures against a set of expectations

324
Q

Security controls

A

Safeguards designed to reduce specific security risks

325
Q

Security ethics

A

Guidelines for making appropriate decisions as a security professional

326
Q

Security frameworks

A

Guidelines used for building plans to help mitigate risk and threats to data and privacy

327
Q

Security governance

A

Practices that help support, define, and direct security efforts of an organization

328
Q

Security hardening

A

The process of strengthening a system to reduce its vulnerabilities and attack surface

329
Q

Security information and event management (SIEM)

A

An application that collects and analyzes log data to monitor critical activities in an organization

330
Q

Security mindset

A

The ability to evaluate risk and constantly seek out and identify the potential or actual breach of a system, application, or data

331
Q

Security operations center (SOC)

A

An organizational unit dedicated to monitoring networks, systems, and devices for security threats or attacks

332
Q

Security orchestration, automation, and response (SOAR)

A

A collection of applications, tools, and workflows that use automation to respond to security events

333
Q

Security posture

A

An organization’s ability to manage its defense of critical assets and data and react to change

334
Q

Security zone

A

A segment of a company’s network that protects the internal network from the internet

335
Q

Select

A

The third step of the NIST RMF that means to choose, customize, and capture documentation of the controls that protect an organization

336
Q

Sensitive data

A

A type of data that includes personally identifiable information (PII), sensitive personally identifiable information (SPII), or protected health information (PHI)

337
Q

Sensitive personally identifiable information (SPII)

A

A specific type of PII that falls under stricter handling guidelines

338
Q

Separation of duties

A

The principle that users should not be given levels of authorization that would allow them to misuse a system

339
Q

Session

A

a sequence of network HTTP requests and responses associated with the same user

340
Q

Session cookie

A

A token that websites use to validate a session and determine how long that session should last

341
Q

Session hijacking

A

An event when attackers obtain a legitimate user’s session ID

342
Q

Session ID

A

A unique token that identifies a user and their device while accessing a system

343
Q

Set data

A

Data that consists of an unordered collection of unique values

344
Q

Shared responsibility

A

The idea that all individuals within an organization take an active role in lowering risk and maintaining both physical and virtual security

345
Q

Shell

A

The command-line interpreter

346
Q

Signature

A

A pattern that is associated with malicious activity

347
Q

Signature analysis

A

A detection method used to find events of interest

348
Q

Simple Network Management Protocol (SNMP)

A

A network protocol used for monitoring and managing devices on a network

349
Q

Single sign-on (SSO)

A

A technology that combines several different logins into one

350
Q

Smishing

A

The use of text messages to trick users to obtain sensitive information or to impersonate a known source

351
Q

Smurf attack

A

A network attack performed when an attacker sniffs an authorized user’s IP address and floods it with ICMP packets

352
Q

Social engineering

A

A manipulation technique that exploits human error to gain private information, access, or valuables

353
Q

Social media phishing

A

A type of attack where a threat actor collects detailed information about their target on social media sites before initiating the attack

354
Q

Spear phishing

A

A malicious email attack targeting a specific user or group of users, appearing to originate from a trusted source

355
Q

Speed

A

The rate at which a device sends and receives data, measured by bits per second

356
Q

Splunk Cloud

A

A cloud-hosted tool used to collect, search, and monitor log data

357
Q

Splunk Enterprise

A

A self-hosted tool used to retain, analyze, and search an organization’s log data to provide security information and alerts in real-time

358
Q

Spyware

A

Malware that’s used to gather and sell information without consent

359
Q

SQL (Structured Query Language)

A

A programming language used to create, interact with, and request information from a database

360
Q

SQL injection

A

An attack that executes unexpected queries on a database

361
Q

Stakeholder

A

An individual or group that has an interest in any decision or activity of an organization

362
Q

Standard error

A

An error message returned by the OS through the shell

363
Q

Standard input

A

Information received by the OS via the command line

364
Q

Standard output

A

Information returned by the OS through the shell

365
Q

Standards

A

References that inform how to set policies

366
Q

STAR method

A

An interview technique used to answer behavioral and situational questions

367
Q

Stateful

A

A class of firewall that keeps track of information passing through it and proactively filters out threats

368
Q

Stateless

A

A class of firewall that operates based on predefined rules and that does not keep track of information from data packets

369
Q

Stored XSS attack

A

An instance when malicious script is injected directly on the server

370
Q

String concatenation

A

The process of joining two strings together

371
Q

String data

A

Data consisting of an ordered sequence of characters

372
Q

Style guide

A

A manual that informs the writing, formatting, and design of documents

373
Q

Subnetting

A

The subdivision of a network into logical groups called subnets

374
Q

Substring

A

A continuous sequence of characters within a string

375
Q

Sudo

A

A command that temporarily grants elevated permissions to specific users

376
Q

Supply-chain attack

A

An attack that targets systems, applications, hardware, and/or software to locate a vulnerability where malware can be deployed

377
Q

Suricata

A

An open-source intrusion detection system, intrusion prevention system, and network analysis tool

378
Q

Switch

A

A device that makes connections between specific devices on a network by sending and receiving data between them

379
Q

Symmetric encryption

A

The use of a single secret key to exchange information

380
Q

Synchronize (SYN) flood attack

A

A type of DoS attack that simulates a TCP/IP connection and floods a server with SYN packets

381
Q

Syntax

A

The rules that determine what is correctly structured in a computing language

382
Q

Syntax error:

A

An error that involves invalid usage of a programming language

383
Q

Tailgating

A

A social engineering tactic in which unauthorized people follow an authorized person into a restricted area

384
Q

TCP/IP model

A

A framework used to visualize how data is organized and transmitted across a network

385
Q

tcpdump

A

A command-line network protocol analyzer

386
Q

Technical skills

A

Skills that require knowledge of specific tools, procedures, and policies

387
Q

Telemetry

A

The collection and transmission of data for analysis

388
Q

Threat

A

Any circumstance or event that can negatively impact assets

389
Q

Threat actor:

A

Any person or group who presents a security risk

390
Q

Threat hunting

A

The proactive search for threats on a network

391
Q

Threat intelligence

A

Evidence-based threat information that provides context about existing or emerging threats

392
Q

Threat modeling

A

The process of identifying assets, their vulnerabilities, and how each is exposed to threats

393
Q

Transferable skills

A

Skills from other areas that can apply to different careers

394
Q

Transmission Control Protocol (TCP)

A

An internet communication protocol that allows two devices to form a connection and stream data

395
Q

Triage

A

The prioritizing of incidents according to their level of importance or urgency

396
Q

Trojan horse

A

Malware that looks like a legitimate file or program

397
Q

True negative

A

A state where there is no detection of malicious activity

398
Q

True positive

A

An alert that correctly detects the presence of an attack

399
Q

Tuple data

A

Data structure that consists of a collection of data that cannot be changed

400
Q

Type error

A

An error that results from using the wrong data type

401
Q

Ubuntu

A

An open-source, user-friendly distribution that is widely used in security and other industries

402
Q

Unauthorized access

A

An incident type that occurs when an individual gains digital or physical access to a system or application without permission

403
Q

Uncontrolled zone

A

Any network outside your organization’s control

404
Q

Unified Extensible Firmware Interface (UEFI)

A

A microchip that contains loading instructions for the computer and replaces BIOS on more modern systems

405
Q

USB baiting

A

An attack in which a threat actor strategically leaves a malware USB stick for an employee to find and install to unknowingly infect a network

406
Q

User

A

The person interacting with a computer

407
Q

User Datagram Protocol (UDP)

A

A connectionless protocol that does not establish a connection between devices before transmissions

408
Q

User-defined function

A

A function that programmers design for their specific needs

409
Q

User interface

A

A program that allows the user to control the functions of the operating system

410
Q

User provisioning

A

The process of creating and maintaining a user’s digital identity

411
Q

Variable

A

A container that stores data

412
Q

Virtual machine (VM)

A

A virtual version of a physical computer

413
Q

Virtual Private Network (VPN)

A

A network security service that changes your public IP address and hides your virtual location so that you can keep your data private when you are using a public network like the internet

414
Q

Virus

A

Malicious code written to interfere with computer operations and cause damage to data and software

415
Q

VirusTotal

A

A service that allows anyone to analyze suspicious files, domains, URLs, and IP addresses for malicious content

416
Q

Vishing

A

The exploitation of electronic voice communication to obtain sensitive information or to impersonate a known source

417
Q

Visual dashboard

A

A way of displaying various types of data quickly in one place

418
Q

Vulnerability

A

A weakness that can be exploited by a threat

419
Q

Vulnerability assessment

A

The internal review process of an organization’s security systems

420
Q

Vulnerability management

A

The process of finding and patching vulnerabilities

421
Q

Vulnerability scanner

A

Software that automatically compares existing common vulnerabilities and exposures against the technologies on the network

422
Q

Watering hole attack

A

A type of attack when a threat actor compromises a website frequently visited by a specific group of users

423
Q

Web-based exploits

A

Malicious code or behavior that’s used to take advantage of coding flaws in a web application

424
Q

Whaling

A

A category of spear phishing attempts that are aimed at high-ranking executives in an organization

425
Q

Wide Area Network (WAN)

A

A network that spans a large geographic area like a city, state, or country

426
Q

Wi-Fi Protected Access (WPA)

A

A wireless security protocol for devices to connect to the internet

427
Q

Wildcard

A

A special character that can be substituted with any other character

428
Q

Wireshark

A

An open-source network protocol analyzer

429
Q

World-writable file

A

A file that can be altered by anyone in the world

430
Q

Worm

A

Malware that can duplicate and spread itself across systems on its own

431
Q

YARA-L

A

A computer language used to create rules for searching through ingested log data

432
Q

Zero-day

A

An exploit that was previously unknown