Day 2 Reversed Flashcards

1
Q

BIOS

A

Basic Input/Output System

Firmware based initialization code for booting a system.

The now deprecated initial program sets for computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Bluetooth

A

802.15

Technology commonly used to communicate with small devices at modest speeds over a short range with low security requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

BCP

A

Business Continuity Plan

The orderly planning for and management of threats and incidents to an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

BGP

A

Border Gateway Protocol

Routing protocol for routing exterior traffic between autonomous systems/organizations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

BO

A

Buffer Overflow

The insertion of malicious computer instructions into the RAM of a host to accomplish denial of service or injecting shellcode.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

BPA

A

Business Partners Agreement

This outlines the goals and responsibilities between entities pursuing a common work product.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

BPDU

A

Bridge Protocol Data Unit

This protocol is used to identify efficient paths and loops in a switched network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

BSSID

A

Basic Service Set IDentifier

This is the MAC address that a wireless device is attached to.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Brute Force

A

Brute Force Attack

Discovers a hash or encrypted secret by attempting all combinations and permutations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

BYOD

A

Bring Your Own Device

The organization compensates the individual for use of their phone in organizational activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

C2

A

Command and Control

Servers that are centrally placed the hold control instructions for illicitly managed hosts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

CA

A

Certificate Authority

This entity issues certificates. After verifying them, and is the center of trust in PKI.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

CAC

A

Common Access Card

A form of identification with photograph, barcode, RFID and cryptographic storage of private key information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

CAPTCHA

A

Completely Automated Public Turing to Tell Computers and Humans Apart

This is intended to prevent rogue automated attempts at access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

CAR

A

Corrective Action Report

A document generated when the defect or error has been detected that has the goal of eliminating a reoccurrence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

CASB

A

Cloud Access Security Broker

A software resource place between users and cloud applications that monitors and enforces policy-based access to cloud resources.

17
Q

CBC

A

Cipher Block Chaining

Each plaintext block is XORed (see XOR) with the immediately previous ciphertext block.

18
Q

CBT

A

Computer-Based Training

Courseware or lessons that are delivered via a computer, commonly used for at home and corporate training.

19
Q

CCMP

A

Counter-Mode/CBC-Mac Protocol

Each plaintext block is XORed (see XOR) with the immediately previous ciphertext block that includes a message authentication code.

20
Q

CCTV

A

Closed-Circuit Television

Allows monitoring and recording of activities in an area.

21
Q

CER

The point at which false acceptances are equal to false rejection.

A

Cross-Over Error Rate

22
Q

CER

A generic term for a document that facilitates authentication.

A

Certificate

23
Q

CERT

A

Computer Emergency Response Team

A multi-discipline group designated to handle IT incidents.

24
Q

CFB

A

Cipher Feedback

A mode of operation for a block cipher.

25
Q

Chain Of Custody

A

Evidence Control and Management

The documentation of handling and protection of evidence.