Day 3 Flashcards

1
Q

Commonly used by routers and has several derivatives in use by Microsoft for authentication.

A

CHAP

Challenge Handshake Authentication Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The most senior official in an organization responsible for the information technology and systems that support enterprise.

A

CIO

Chief Information Officer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A group that investigates and resolves IT security problems.

A

CIRT

Computer Incident Response Team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Its mission is to identify develop, promote, and lead the world with regard to best practices for cybersecurity solutions.

A

CIS

Center for Internet Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An organizational process designed to facilitate making changes to organizational resources in such a way that they are identifiable, auditable, and orderly.

A

CMP

Change Management Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

These are applications that facilitate the creation, editing, publishing and archival of web pages and content.

A

CMS

Content Management System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An identifying name that may be applied to a directory resource, such as a user, server, or other object.

A

CN

Common Name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Ensuring that vital and primary mission essential functions continue to run, even in the face of emergencies.

A

COOP

Continuity of Operations Plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Smart phones owned by the organization, but approved for personal use.

A

COPE

Corporate Owned, Personally Enabled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Procedures to follow in the event of a catastrophic incident, even though it may be unlikely.

A

CP

Contingency Planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

An error checking code, used in digital technology primarily to identify accidental changes to data.

A

CRC

Cyclical Redundancy Check

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A class of malware that automates malicious activity.

A

Crimeware

Cyber theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

This is maintained by a certificate authority to identify certificates associated with compromised or lost private keys.

A

CRL

Certificate Revocation List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

This official is responsible for development, oversight, mitigation and other risk strategies.

A

CSO

Chief Security Officer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

An organization that provides Iaas, PaaS or Iaas to an array of customers.

A

CSP

Cloud Service Provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A nonprofit organization that promotes best practices in security for cloud-based computing.

A

CSA

Cloud Security Alliance

17
Q

Information technology personnel whose purpose is to prevent, manage and coordinate actions about security incidents.

A

CSIRT

Computer Security Incident Response Team

18
Q

An executive position in charge of policy and programs to reduce risk in an organization.

A

CSO

Chief Security Officer

19
Q

An organization that provides cloud-based access to infrastructure, storage and/or applications.

A

CSP

Cloud Service Provider

20
Q

Created by an applicant seeking to gain a certificate from an authority.

A

CSR

Certificate Signing Request

21
Q

An attack wherein a message is spoofed from a user to a trusted site.

A

CSRF

Cross-site Request Forgery

22
Q

A connecting device used to link an organization to telco-based T-services

A

CSU

Channel Service Unit

23
Q

The executive person tasked with identifying useful technology, IT strategies and partnerships.

A

CTO

Chief Technology Officer

24
Q

Legacy management.

A

CTOS

Centralized terminal operating system.

25
Q

This form of encryption is used by AES to perform streaming encryption.

A

CTR

Counter

26
Q

A database of known and published software flaws that may impact security that is managed by MITRE.

A

CVE

Common Vulnerabilities and Exposures