Domain 5 Flashcards

1
Q

Application server

A

A computer responsible for hosting applications to user workstations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Asymmetric encryption

A

An algorithm that uses one key to encrypt and a different key to decrypt the input plain text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Check s u m

A

A digit representing the sum of the correct digits in a piece of stored or transmitted digital data, against which later comparisons can be made to detect errors in the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Cipher text

A

The altered form of a plain text message so it is unreadable for anyone except the intended recipients. In other words, it has been turned into a secret

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Classification

A

Classification identifies the degree of harm to the organization, at stakeholders or others that might result if an information asset is divulged into an unauthorized person process or organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Configuration management

A

A process and discipline used to ensure that the only changes made to a system are those that have been authorized and validated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Cryptanalyst

A

One who performs crimp Krypt analysis which is the study of mathematical techniques for attempting to defeat cryptographic techniques and/or Information Systems security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Cryptography

A

The study your applications of methods to secure or protect the meaning and content of messages, files, or other information, usually by disguise, obscuration, or other transformations of that content and meeting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Data loss prevention or DLP

A

System capabilities designed to detect and prevent the unauthorized use and transmission of information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Decryption

A

The reverse process from encryption. It is the process of converting a ciphertext message back into plain text through the use of cryptographic algorithm and the appropriate key for decryption which is the same for symmetric encryption, but different for asymmetric encryption. This term is also used interchangeably with deciphering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Degasing

A

A technique of erasing data on disc or tape including videotapes.com when perform properly, ensures that there is an insufficient magnetic remnants to reconstruct data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Digital signature

A

The result of a cryptographic transformation of data which when used properly provides the services of origin authentication, data integrity, and sign or non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Egress monitoring

A

Monitoring of outgoing Network traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Encryption

A

The process and act of converting the message from its plain text to ciphertext. Sometimes it is also referred to as insiphering. The two terms are sometimes used interchangeably in literature and have the same meaning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Encryption system

A

The total set of algorithms, processes, hardware, software, and procedures that taken together provide an encryption and decryption capability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Hardening

A

A reference to the process of applying secure configurations to reduce the attack surface and locking down various hardware, communication systems, and software including operating system, web server, application server, Etc hardening is normally performed based on industry guidelines and benchmarks, such as those provided by the center for Internet Security or CIS

17
Q

Hash function

A

An algorithm that computes a numerical value called the hash value on a data file or electronic message that is used to represent that file or message and depends on the entire contents of the file or message

18
Q

Hashing

A

The process of using a mathematical algorithm against data to produce a numeric value that is representative of that data

19
Q

Information sharing

A

The requirements for information sharing by an IT system with one or more other it systems or applications, for information sharing to support multiple internal or external organizations, missions, or public programs

20
Q

Ingress monitoring

A

Monitoring of incoming Network traffic

21
Q

Message Digest

A

A digital signature that uniquely identifies data and has the property such that changing a single bit in the data will cause a completely different message digest to be generated

22
Q

Operating system

A

The software Master Control application that runs the computer.

23
Q

Patch

A

A software component that, when installed, directly modifies files or device settings related to a different software component without changing the version number or release details for the related software component

24
Q

Patch management

A

The systematic notification identification, deployment, installation and verification of operating system and application software code revisions these revisions are known as patches

25
Q

Plain text

A

A message or data and it’s natural format and in readable form or extremely vulnerable from a confidentiality perspective

26
Q

Records

A

The recordings of evidence of activities performed or results achieved which serve as a basis for verifying that the organization and the information system are performing as intended

27
Q

Records retention

A

A practice based on the records life cycle, according to which records are retained as long as necessary, and then are destroyed after the appropriate time interval has elapsed

28
Q

Remnants

A

Residual information remaining on storage media after clearing

29
Q

Request for change or RFC

A

The first stage of change management, we’re in a change in procedure or product is sought by a stakeholder

30
Q

Security governance

A

The entirety of the policies, roles, and processes the organization uses to make security decisions in an organization

31
Q

Social engineering

A

Tactics to infiltrate systems via email, phone, text, or social media, often impersonating a person or agency in Authority or offering a gift. A low-tech method would be simply following someone into a secure building

32
Q

Symmetric encryption

A

An algorithm that uses the same key in both the encryption and decryption processes

33
Q

Web server

A

A computer that provides worldwide web or www.services on the Internet it includes the hardware, operating system, web server software, and website content.

34
Q

Whaling attack

A

Phishing attacks that attempt to trick highly placed officials or private individuals with sizable assets into an authorizing a large fund wire transfer to previously unknown entities