Day 4 Flashcards

1
Q

An empirical scheme for rating vulnerability severity based upon specific aspects of the vulnerability, environment, and nature of threats.

A

CVSS

Common Vulnerability Scoring System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

In this mode of control and acquisition, an employee chooses a device from a company provided list. Ownership may be personal or organization.

A

CYOD

Choose Your Own Device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The creator has all control over an asset and access to it. The default form of access for Windows.

A

DAC

Discretionary Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Exemplified by data center personnel who manage and maintain systems.

A

Data custodian

Facilitates use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Determines logical controls, authorizes use and defines required security.

A

Data owner

Responsible for use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

This role is filled by personnel capable of managing automated and large information repositories.

A

DBA

Database Administrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

This attack methodology involves a multitude of remotely controlled devices focusing upon a single target.

A

DDoS

Distributed Denial of Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

And operating system memory management technique that prevents user data from overlapping into computer instructions.

A

DEP

Data Execution Prevention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A commonly used method of encoding the data that makes up the certificate using ASN.1.

A

DER

Distinguished Encoding Rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The first US government standard for symmetric encryption. It has a 56 bit key.

A

DES

Digital Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

This is an extension of BOOTP and is used to dynamically allocate IPs.

A

DHCP

Dynamic Host Configuration Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

This is a key exchange algorithm that enhances confidentiality by discarding the session keys after use.

A

DHE

Diffie-Hellman Ephemeral

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Performs hashing or encryption on an array of predetermined candidate phrases, and compares it to the secret.

A

Dictionary

Dictionary attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

It moves files to alternative media that have the archive bit set, and then it does not clear it.

A

Differential BU

Differential backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A messaging security standard designed to facilitate non-repudiation between sender and receiver.

A

DKIM

Domain Keys Identified Mail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

These files are not directly executed, but are called up by an application when certain additional functions or libraries are needed.

A

DLL

Dynamic Link Library

17
Q

Strategies and applications that prevent data theft or illicit access.

A

DLP

Data Loss Prevention

18
Q

This is an email security standard designed to allow domains to protect themselves from unauthorized use and spoofing.

A

DMARC

Domain Message
Authentication Reporting
and Conformance

19
Q

The initial destination of a packet as it enters a NAT system to be redirected to another destination.

A

DNAT

Destination Network Address Translation

20
Q

The perimeter area where the outside world may access certain services.

A

DMZ

Demilitarized Zone

21
Q

An application that handles symbolic name to address mappings, as well as the reverse.

A

DNS

Domain Name Service

22
Q

An array of tools devised by the IETF to secure DNS transactions.

A

DNSSEC

Domain Name System Security Extensions

23
Q

A one on one attack that causes access or utility to cease.

A

DoS

Denial of Service

24
Q

A senior officer responsible for an organization’s data protection strategies and compliance.

A

DPO

Data Protection Officer

25
Q

The immediate plans for recovery of operations or services in the event of a catastrophic incident.

A

DRP

Disaster Recovery Plan