Day 14 COPY Flashcards

1
Q

An agreement on the characteristics of quality and performance between two parties.

A

SLA

Service Level Agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The value of an asset multiplied times the exposure factor.

A

SLE

Single Loss Expectancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

This is a core Microsoft protocol used for general access and authentication.

A

SMB

Server Message Block

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Developed by RSA, this is a formatting standard originally created for implementing digital signatures and encryption with public key infrastructure.

A

S/MIME

Secure/Multipurpose Internet Mail Extensions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Protocol used by cell phones to exchange brief text-based messages.

A

SMS

Short Message Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The vulnerable application responsible for forwarding email to a destination server or receiving it from a sender.

A

SMTP

Simple Mail Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The secured application responsible for forwarding email to a destination server or receiving it from a sender.

A

SMTPS

Simple Mail Transfer Protocol Secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A network-based application designed to discover device status, change configuration and receive errors and exceptions.

A

SNMP

Simple Network Management Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The structured markup used to identify components of service oriented architecture messages.

A

SOAP

Simple Object Access Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A software architecture designed to allow an organization to collect and analyze threat information from numerous sources and inputs, as well as respond to incidents

A

SOAR

Security Orchestration, Automation, Response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The minimization of an application and operating system to a state that will fit on an integrated circuit.

A

SoC

System on Chip

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

This is a hub of operations and communication that focuses on security incidents and management at a technical level.

A

SOC

Security Operations Center

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

An email validation architecture designed to detect and eliminate spoofing and spamming through approved mail exchangers.

A

SPF

Sender Policy Framework

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Chat messages delivered as a hoax were to induce purchase.

A

SPIM

Spam over Internet Messaging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The use of SMS to deliver unwanted messages.

A

SPIT

Spam over Internet Telephony

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A device, business process or person that is critical to a business and has no redundancy.

A

SPoF

Single Point of Failure

17
Q

An industry-standard mass information repository retrieval system.

A

SQL

Structured Query Language

18
Q

Manipulation of input to the front end of a server in order to gain access to the data repositories.

A

SQLi

SQL injection

19
Q

A secure form of Internet protocol-based telephony.

A

SRTP

Secure Real-Time Protocol

20
Q

Nonvolatile storage using persistent solid-state flash memory to store and retrieve information.

A

SSD

Solid State Drive

21
Q

This protocol, runs over TCP/22 and encrypts its exchanges.

A

SSH

Secure Shell

22
Q

An identifier for a wireless network.

A

SSID

Service Set Identifier

23
Q

A certificate-based authentication and encryption application that would securely process any TCP-based layer 7 protocol.

A

SSL

Secure Sockets Layer

24
Q

An authentication architecture that relies on a central system and it’s authentication to authorize users for other services using a single set of credentials.

A

SSO

Single Sign-on

25
Q

Developed by OASIS and MITRE, this is an international standard for sharing intelligence and threat information

A

STIX

Structured Threat Information eXpression