Domain 5 Flashcards

Security Operations

1
Q

Application Server

A

computer responsible for hosting applications to user workstations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Asymmetric Encryption

A

algorithm that uses one key to encrypt & different key to decrypt input plaintext

each person would need to have 2 different keys, one to encrypt & one to decrypt, totalling to 4 keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Checksum

A

digit representing the sum of the correct digits in a piece of stored/transmitted digital data, against which later comparisons can be made to detect errors in data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Ciphertext

A

altered form of a plaintext that makes it unreadable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Classification

A

maintaining confidentiality of data based on sensitivity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Configuration Management

A

process/discipline that ensures only authorized & validated changes are made

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Cryptanalyst

A

performs cryptanalysis, study of mathematical techniques to to defeat cryptographic techniques

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Cryptography

A

securing/protecting the meaning/context of messages, files, etc through disguise, obscuration, etc

hiding/disguising of information to prevent unauthorized access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Data Loss Prevention

A

system capabilities designed to detect or prevent unauthorized transmission of information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Decryption

A

reverse process from encryption (cipher to plaintext). “Deciphering”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Degaussing

A

technique of erasing data on disk/tape that ensures insufficient magnetic remanence to reconstruct data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Digital Signature

A

cryptographic transformation of data that provides origin authentication, data integrity, & signer non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Egress Monitoring

A

monitoring of outgoing network traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Encryption

A

converting plaintext to ciphertext. “Enciphering”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Encryption System

A

total set of algorithms, processes, hardware, software, & procedures that provide an encryption/decryption capability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Hardening

A

process of applying secure configurations to reduce attack surface. Based on Center for Internet Security (CIS) guidelines/benchmarks

17
Q

Hash Function

A

algorithm computes a numerical (hash) value on data file/electronic message used as identifier (“fingerprint”)

18
Q

Hashing

A

process of using Hash Function to represent data/file/etc

19
Q

Information Sharing

A

requirements set by the IT System/apps for information transfers

20
Q

Ingress Monitoring

A

monitoring of incoming network traffic

21
Q

Message Digest

A

digital signature that will change if the data is altered

hash function that protects the integrity of the associated data

22
Q

Operating System

A

“master control application” software that runs the computer

23
Q

Patch

A

software component that directly modifies files/device settings related to another component

24
Q

Patch Management

A

systematic notification, identification, deployment, installation, & verification of OS & application software code revisions

“patches”, “hot fixes”, & “service packs”

25
Plaintext
natural, readable form of message/data
26
Records
recordings of evidence of activities performed or results achieved
27
Record Retention
practice of maintaining/destroying records
28
Remanence
residual information remaining on cleared storage
29
Request for Change
stakeholder officially seeking change to product/procedure
30
Security Governance
entirety of policies, rules, & processes the organization uses to make security decisions
31
Social Engineering
tactics to infiltrate system via email, phone, text, social media, etc often impersonating a person/agency in authority or offering a gift
32
Symmetric Encryption
algorithm that uses the same key in both encryption/decryption processes
33
Web Server
provides World Wide Web services to the Internet
34
Whaling Attack
phishing attacks that attempt to trick highly placed officials/private individuals with sizable assets into authorizing large fund wire transfers to unknown entitites