Day 1 Reversed Flashcards

1
Q

3DES

A

Triple Digital Encryption Standard

Performs encryption in 3 rounds of the same algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

802.1x

A

Switch Authentication

Standard for controlling access to intranet infrastructure devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

AAA

A

Authentication, Authorization, and Accounting

The principle of verifying identity, capability and use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ABAC

A

Attribute-based Access Control

Granting access based upon the characteristic of the subject, such as clearance level.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

ACL

A

Access Control List

Restricting entry, based upon a listing of controls or permissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

AES

A

Advanced Encryption Standard

Rijndael was approved by the US government and given this title.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

AES256

A

Advanced Encryption Standards 256bit

The 256 bit version of this algorithm is its highest level and is deemed uncrackable by brute force methods.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

AH

A

Authentication Header

This header transmits in clear text but authenticates and integrity checks each packet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

AI

A

Artificial Intelligence

The simulation of human intelligence and thinking in a machine, including adaptive learning and problem-solving.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

AIS

A

Automatic Indicator Sharing

Automated sharing of threat information between organizations to enhance detection and response.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

ALE

A

Annualized Loss Expectancy

The single loss expectancy times the annualized rate of occurrence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ALG

A

Application Layer Gateway

This is a type of firewall able to inspect headers and payload in the upper protocol layers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

AP

A

Access Point

Infrastructure connection point for most wireless networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

API

A

Application Programming Interface

These are development tools used by programmers that have prebuilt functions with desired utility.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

APT

A

Advanced Persistent Threat

Applications with advanced targeting, zero days and exfiltration techniques that are aimed at particular organizations or industries.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

ARO

A

Annualized Rate of Occurrence

Most risk assessments track threats and attacks on an annualized basis.

17
Q

ARP

A

Address Resolution Protocol

Given the IP address, this protocol will locate the MAC address.

18
Q

ASLR

A

Address Space Layout Randomization

This randomizes the location of an application in memory making it harder for attackers to successfully perform the buffer overflow.

19
Q

ASP

A

Application Service Provider

An organization provides access to its custom developed software, such as accounting or customer management.

20
Q

ATT&CK

A

Adversarial Tactics, Techniques, and Common Knowledge

A database of adversarial tactics and techniques that might be used to compromise systems organizations to enhance threat management.

21
Q

Asymmetric Key

A

Public Key

The use of complementary values to disguise and then reveal information.

22
Q

AUP

A

Acceptable Use Policy

This policy is legally required, if HR wants to fire someone for misuse.

23
Q

AV

A

Antivirus

Designed to identify malware, primarily based upon known patterns.

24
Q

AV
(Not Antivirus)

A

Asset Value

This can be the replacement cost or income derived from something.

25
Q

AXFR

A

Zone Transfer

The synchronization of name resolution information between a primary and secondary DNS server.

26
Q

BASH

A

Bourne Again Shell

A UNIX and Linux command interface and language.

27
Q

BIA

A

Business Impact Analysis

This is the prerequisite for disaster recovery and continuity planning to identify potential losses.

Assessing the criticality of business activities and assets in order to determine the appropriate protection and recovery options.