Day 3 Reversed Flashcards

1
Q

CHAP

A

Challenge Handshake Authentication Protocol

Commonly used by routers and has several derivatives in use by Microsoft for authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

CIO

A

Chief Information Officer

The most senior official in an organization responsible for the information technology and systems that support enterprise.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

CIRT

A

Computer Incident Response Team

A group that investigates and resolves IT security problems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

CIS

A

Center for Internet Security

Its mission is to identify develop, promote, and lead the world with regard to best practices for cybersecurity solutions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

CMP

A

Change Management Policy

An organizational process designed to facilitate making changes to organizational resources in such a way that they are identifiable, auditable, and orderly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

CMS

A

Content Management System

These are applications that facilitate the creation, editing, publishing and archival of web pages and content.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

CN

A

Common Name

An identifying name that may be applied to a directory resource, such as a user, server, or other object.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

COOP

A

Continuity of Operations Plan

Ensuring that vital and primary mission essential functions continue to run, even in the face of emergencies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

COPE

A

Corporate Owned, Personally Enabled

Smart phones owned by the organization, but approved for personal use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

CP

A

Contingency Planning

Procedures to follow in the event of a catastrophic incident, even though it may be unlikely.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

CRC

A

Cyclical Redundancy Check

An error checking code, used in digital technology primarily to identify accidental changes to data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Crimeware

A

Cyber Theft

A class of malware that automates malicious activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

CRL

A

Certificate Revocation List

This is maintained by a certificate authority to identify certificates associated with compromised or lost private keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

CSO

A

Chief Security Officer

This official is responsible for development, oversight, mitigation and other risk strategies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

CSP

A

Cloud Service Provider

An organization that provides Iaas, PaaS or Iaas to an array of customers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

CSA

A

Cloud Security Alliance

A nonprofit organization that promotes best practices in security for cloud-based computing.

17
Q

CSIRT

A

Computer Security Incident Response Team

Information technology personnel whose purpose is to prevent, manage and coordinate actions about security incidents.

18
Q

CSO

A

Chief Security Officer

An executive position in charge of policy and programs to reduce risk in an organization.

19
Q

CSP

A

Cloud Service Provider

An organization that provides cloud-based access to infrastructure, storage and/or applications.

20
Q

CSR

A

Certificate Signing Request

Created by an applicant seeking to gain a certificate from an authority.

21
Q

CSRF

A

Cross-Site Request Forgery

An attack wherein a message is spoofed from a user to a trusted site.

22
Q

CSU

A

Channel Service Unit

A connecting device used to link an organization to telco-based T-services.

23
Q

CTO

A

Chief Technology Officer

The executive person tasked with identifying useful technology, IT strategies and partnerships.

24
Q

CTOS

A

Centralized Terminal Operating System

Legacy management.

25
Q

CTR

A

Counter

This form of encryption is used by AES to perform streaming encryption.

26
Q

CVE

A

Common Vulnerabilities and Exposures

A database of known and published software flaws that may impact security that is managed by MITRE.