Day 2 Flashcards

1
Q

Firmware based initialization code for booting a system.

The now deprecated initial program sets for computer.

A

BIOS

Basic Input/Output System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Technology commonly used to communicate with small devices at modest speeds over a short range with low security requirements.

A

Bluetooth

802.15

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The orderly planning for and management of threats and incidents to an organization.

A

BCP

Business Continuity Plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Routing protocol for routing exterior traffic between autonomous systems/organizations.

A

BGP

Border Gateway Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The insertion of malicious computer instructions into the RAM of a host to accomplish denial of service or injecting shellcode.

A

BO

Buffer overflow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

This outlines the goals and responsibilities between entities pursuing a common work product.

A

BPA

Business Partners Agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

This protocol is used to identify efficient paths and loops in a switched network.

A

BPDU

Bridge Protocol Data Unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

This is the MAC address that a wireless device is attached to.

A

BSSID

Basic Service Set IDentifier

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Discovers a hash or encrypted secret by attempting all combinations and permutations.

A

Brute force

Brute force attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The organization compensates the individual for use of their phone in organizational activities.

A

BYOD

Bring Your Own Device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Servers that are centrally placed the hold control instructions for illicitly managed hosts.

A

C2

Command and control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

This entity issues certificates. After verifying them, and is the center of trust in PKI.

A

CA

Certificate Authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A form of identification with photograph, barcode, RFID and cryptographic storage of private key information.

A

CAC

Common Access Card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

This is intended to prevent rogue automated attempts at access.

A

CAPTCHA

Completely Automated
Public Turing to Tell
Computers and Humans
Apart

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A document generated when the defect or error has been detected that has the goal of eliminating a reoccurrence.

A

CAR

Corrective Action Report

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A software resource place between users and cloud applications that monitors and enforces policy-based access to cloud resources.

A

CASB

Cloud Access Security Broker

17
Q

Each plaintext block is XORed (see XOR) with the immediately previous ciphertext block.

A

CBC

Cipher Block Chaining

18
Q

Courseware or lessons that are delivered via a computer, commonly used for at home and corporate training.

A

CBT

Computer-Based Training

19
Q

Each plaintext block is XORed (see XOR) with the immediately previous ciphertext block that includes a message authentication code.

A

CCMP

Counter-Mode/CBC-Mac Protocol

20
Q

Allows monitoring and recording of activities in an area.

A

CCTV

Closed-circuit Television

21
Q

The point at which false acceptances are equal to false rejection.

A

CER

Cross-over Error Rate

22
Q

A generic term for a document that facilitates authentication.

A

CER

Certificate

23
Q

A multi-discipline group designated to handle IT incidents.

A

CERT

Computer Emergency Response Team

24
Q

A mode of operation for a block cipher.

A

CFB

Cipher Feedback

25
Q

The documentation of handling and protection of evidence.

A

Chain of custody

Evidence control and management