Day 1 Flashcards

1
Q

Performs encryption in 3 rounds of the same algorithm

A

3DES

Triple Digital Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Standard for controlling access to intranet infrastructure devices.

A

802.1x

Switch authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The principle of verifying identity, capability and use.

A

AAA

Authentication
Authorization, and
Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Granting access based upon the characteristic of the subject, such as clearance level.

A

ABAC

Attribute-based Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Restricting entry, based upon a listing of controls or permissions.

A

ACL

Access Control List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Rijndael was approved by the US government and given this title.

A

AES

Advanced Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The 256 bit version of this algorithm is its highest level and is deemed uncrackable by brute force methods.

A

AES256

Advanced Encryption Standards 256bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

This header transmits in clear text but authenticates and integrity checks each packet.

A

AH

Authentication Header

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The simulation of human intelligence and thinking in a machine, including adaptive learning and problem-solving.

A

AI

Artificial Intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Automated sharing of threat information between organizations to enhance detection and response.

A

AIS

Automatic Indicator Sharing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The single loss expectancy times the annualized rate of occurrence.

A

ALE

Annualized Loss Expectancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

This is a type of firewall able to inspect headers and payload in the upper protocol layers.

A

ALG

Application Layer Gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Infrastructure connection point for most wireless
networks.

A

AP

Access Point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

These are development tools used by programmers that have prebuilt functions with desired utility.

A

API

Application Programming Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Applications with advanced targeting, zero days and exfiltration techniques that are aimed at particular organizations or industries.

A

APT

Advanced Persistent Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Most risk assessments track threats and attacks on an annualized basis.

A

ARO

Annualized Rate of Occurrence

17
Q

Given the IP address, this protocol will locate the MAC address.

A

ARP

Address Resolution Protocol

18
Q

This randomizes the location of an application in memory making it harder for attackers to successfully perform the buffer overflow.

A

ASLR

Address Space Layout Randomization

19
Q

An organization provides access to its custom developed software, such as accounting or customer management.

A

ASP

Application Service Provider

20
Q

A database of adversarial tactics and techniques that might be used to compromise systems organizations to enhance threat management.

A

ATT&CK

Adversarial Tactics,
Techniques, and
Common Knowledge

21
Q

The use of complementary values to disguise and then reveal information.

A

Asymmetric key

Public key

22
Q

This policy is legally required, if HR wants to fire someone for misuse.

A

AUP

Acceptable Use Policy

23
Q

Designed to identify malware, primarily based upon known patterns.

A

AV

Antivirus

24
Q

This can be the replacement cost or income derived from something.

A

AV

Asset Value

25
Q

The synchronization of name resolution information between a primary and secondary DNS server.

A

AXFR

Zone transfer

26
Q

A UNIX and Linux command interface and language.

A

BASH

Bourne again shell

27
Q

This is the prerequisite for disaster recovery and continuity planning to identify potential losses.

Assessing the criticality of business activities and assets in order to determine the appropriate protection and recovery options.

A

BIA

Business Impact Analysis