Day 4 Reversed Flashcards

1
Q

CVSS

A

Common Vulnerability Scoring System

An empirical scheme for rating vulnerability severity based upon specific aspects of the vulnerability, environment, and nature of threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

CYOD

A

Choose Your Own Device

In this mode of control and acquisition, an employee chooses a device from a company provided list. Ownership may be personal or organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

DAC

A

Discretionary Access Control

The creator has all control over an asset and access to it. The default form of access for Windows.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Data Custodian

A

Facilitates Use

Exemplified by data center personnel who manage and maintain systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Data Owner

A

Responsible For Use

Determines logical controls, authorizes use and defines required security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

DBA

A

Database Administrator

This role is filled by personnel capable of managing automated and large information repositories.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

DDoS

A

Distributed Denial of Service

This attack methodology involves a multitude of remotely controlled devices focusing upon a single target.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

DEP

A

Data Execution Prevention

And operating system memory management technique that prevents user data from overlapping into computer instructions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

DER

A

Distinguished Encoding Rules

A commonly used method of encoding the data that makes up the certificate using ASN.1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

DES

A

Digital Encryption Standard

The first US government standard for symmetric encryption. It has a 56 bit key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

DHCP

A

Dynamic Host Configuration Protocol

This is an extension of BOOTP and is used to dynamically allocate IPs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

DHE

A

Diffie-Hellman Ephemeral

This is a key exchange algorithm that enhances confidentiality by discarding the session keys after use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

DA

A

Dictionary Attack

Performs hashing or encryption on an array of predetermined candidate phrases, and compares it to the secret.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Differential BU

A

Differential Backup

It moves files to alternative media that have the archive bit set, and then it does not clear it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

DKIM

A

Domain Keys Identified Mail

A messaging security standard designed to facilitate non-repudiation between sender and receiver.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

DLL

A

Dynamic Link Library

These files are not directly executed, but are called up by an application when certain additional functions or libraries are needed.

17
Q

DLP

A

Data Loss Prevention

Strategies and applications that prevent data theft or illicit access.

18
Q

DMARC

A

Domain Message Authentication Reporting and Conformance

This is an email security standard designed to allow domains to protect themselves from unauthorized use and spoofing.

19
Q

DNAT

A

Destination Network Address Translation

The initial destination of a packet as it enters a NAT system to be redirected to another destination.

20
Q

DMZ

A

Demilitarized Zone

The perimeter area where the outside world may access certain services.

21
Q

DNS

A

Domain Name Service

An application that handles symbolic name to address mappings, as well as the reverse.

22
Q

DNSSEC

A

Domain Name System Security Extensions

An array of tools devised by the IETF to secure DNS transactions.

23
Q

DoS

A

Denial of Service

A one on one attack that causes access or utility to cease.

24
Q

DPO

A

Data Protection Officer

A senior officer responsible for an organization’s data protection strategies and compliance.

25
Q

DRP

A

Disaster Recovery Plan

The immediate plans for recovery of operations or services in the event of a catastrophic incident.