CySA+ Flashcards
Reaver
A specialized tool used to find WPA and WPA2 passphrases specifically on networks that support the Wi-Fi Protected Setup (WPS) feature.
Aircrack-ng
A suite of tools designed for wireless network testing. The tools in this suite can capture packets from wireless networks, conduct packet injection attacks, and crack preshared keys used on WEP, WPA, and WPA2 networks.
Hashcat
A general-purpose password cracking tool that may also be used on wireless networks.
CAN bus
Controller Area Network. A vehicle bus standard designed to allow microcontrollers and devices to communicate with each other’s applications without a host computer.
Common Platform Enumeration (CPE)
Provides a standard nomenclature for describing product names and versions.
Common Vulnerabilities and Exposures (CVE)
Provides a common nomenclature for describing security-related software flaws.
Common Vulnerability Scoring System (CVSS)
Provides a standardized approach for measuring and describing the severity of security-related software flaws.
FIPS 140-2
U.S. government standard that hardware security modules are certified against.
OpenFlow
Used to allow software-defined network (SDN) controllers to push changes to switches and routers, allowing flow control, network traffic partitioning, and testing of applications and configurations.
Host File
Used by operating systems to map a connection between an IP address and domain names before going to DNS.
Domain Generation Algorithm (DGA)
A program that generates a large list of domain names.
Register
A critical component of computer memory that stores data and instructions for quick processing. High volatility.
Cache
A chip-based computer component that makes retrieving data from the computer memory more efficient. High volatility.
Random Access Memory (RAM)
The hardware in a computing device where the operating system, application programs, and date in current use are kept so they can quickly be reached by the device’s processor.
Routing Table
A set of rules, often viewed in table format, that is used to determine where data packets traveling over an Internet Protocol (IP) network will be directed.
ARP Cache
A collection of Address Resolution Protocol entries that are created when an IP address is resolved to a MAC address.
Process Table
Contains an entry for each process present in they system. Each entry contains several fields that stores all the information pertaining to a single process.
Temporary Swap File
A special type of file used by the computer’s operating system to manage memory. When the computer’s RAM is full of running programs and data, the operating system may use a portion of the computer’s storage (hard drive or SSD) as virtual memory.
Mandatory Access Control (MAC)
Rely on the operating system to control what subjects can access and what actions they can perform.
Virtual Private Cloud (VPC)
A secure, isolated cloud environment hosted within a public cloud.
Cloud Access Security Broker (CASB)
Software tool that serves as intermediaries between cloud services users and cloud service providers. The positioning allows them to monitor user activity and enforce policy requirements.
auth.log (Linux)
In Linux, serves the purpose of recording authentication-related events, including user logins, logouts, and authentication attempts, providing a centralized location for monitoring and troubleshooting security-related activities on a system.
Gramm-Leach-Billey Act (GLBA)
Covers financial institutions, broadly defined. It requires that those institutions have a formal security program and designate an individual as having overall responsibility for the program.
The Health Insurance Portability and Accountability Act (HIPPA)
Includes security and privacy rules that affect healthcare providers, health insurers, and health information clearinghouses.