General Knowledge Flashcards

1
Q

Older computer systems, software, or hardware that are still in use but may be outdated or no longer supported by their manufacturers. They can pose security risks due to their inability to handle modern security threats.

Example: A company continues to use an old version of an operating system, which lacks security patches for newly discovered vulnerabilities.

A

Legacy Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Systems, software, or devices that no longer receive updates or support from the manufacturer, making them vulnerable to security threats because they don’t get patches or fixes for newly discovered vulnerabilities.

Example: A network device that is no longer supported by its manufacturer, and its firmware is not updated to address security flaws.

A

Newly Released Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Newly launched systems, software, or devices that may have undiscovered vulnerabilities, as they have not been extensively tested in the real-world environment, potentially making them targets for attackers.

Example: A newly released operating system may have bugs or security vulnerabilities that haven’t been found yet, making it an early target for exploitation.

A

Unsupported Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A security protocol for wireless networks designed to provide stronger data encryption and protection than WEP. It uses dynamic encryption keys and provides better overall security for Wi-Fi networks.

Example: A home router using this type of encryption to secure its wireless network from unauthorized access.

A

WPA (Wi-Fi Protected Access)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A feature designed to simplify the process of connecting devices to a secure Wi-Fi network, often using a PIN or pressing a button on the router. However, it has known security vulnerabilities. Should be avoided.

Example: Pressing this button on a router to connect a new device, such as a smartphone, to the network without entering the Wi-Fi password.

A

WPS (Wi-Fi Protected Setup)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An older and now outdated wireless security protocol used to secure Wi-Fi networks. It uses static encryption keys, making it vulnerable to attacks such as cracking. Should be avoided.

Example: An older Wi-Fi router that still uses this type of encryption, which can be easily cracked by attackers.

A

WEP (Wired Equivalent Privacy)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A protocol for enabling mobile devices to access internet services, often used for browsing websites and accessing email on older mobile phones.

Example: A mobile phone using this to access a weather service before the widespread use of smartphones with full web browsers.

A

WAP (Wireless Application Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A security system that monitors and filters HTTP traffic between a web application and the internet. It is designed to protect web applications from attacks such as SQL injection, cross-site scripting (XSS), and other vulnerabilities.

A

WAF (Web Application Firewall)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A device that allows wireless devices to connect to a wired network using Wi-Fi or other wireless communication standards. It acts as an interface between the wireless client and the wired network.

Example: A home router functioning as this to allow laptops and smartphones to connect to the internet over Wi-Fi.

A

WAP (Wireless Access Point)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A formal agreement between a company and a service provider to manage and maintain security services for the company’s network or IT systems. It outlines the responsibilities, scope, and expectations for both parties.

A

MSA (Managed Security Agreement)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A service model where a provider offers continuous monitoring of an organization’s network, systems, or applications, often to detect and respond to security incidents.

A

MaaS (Monitoring as a Service)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A company that provides outsourced IT services, such as network management, security, and software maintenance, on a subscription basis.

A

MSP (Managed Service Provider)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A specialized type of MSP that focuses specifically on providing security services, including intrusion detection, firewall management, and vulnerability assessments, often on a 24/7 basis.

A

MSSP (Managed Security Service Provider)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A file format used for storing executable functions and procedures that can be shared and used by multiple programs simultaneously. These help save memory and disk space by allowing programs to use common code.

A

DLL (Dynamic Link Library)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A set of rules and protocols that allow different software applications to communicate with each other. These define the methods and data formats used for interactions between systems.

A

API (Application Programming Interface)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A file format used to store a program that can be run directly by the operating system. These types of files contain machine code that is executed when the file is opened.

A

EXE (Executable File)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A configuration file used to store settings for software applications. These types of files typically contain plain text with sections for different types of settings and values.

A

INI (Initialization File)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A security solution that monitors and responds to suspicious activities on endpoint devices, such as computers and mobile devices, to detect and mitigate threats.

Example: alerts administrators when unusual behavior, such as file encryption, is detected on a user’s device.

A

EDR (Endpoint Detection and Response)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A framework of policies and technologies used to manage and control user identities and access to resources within an organization.

Example: ensure only authorized users can access sensitive data based on their roles and permissions.

A

IAM (Identity and Access Management)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A security framework used to manage user access and actions within a network, ensuring the right users are authenticated, authorized, and their actions are logged for auditing.

Example: uses this to verify the user’s identity, grant access to resources, and track their usage for compliance.

A

AAA (Authentication, Authorization, and Accounting)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A network security device that monitors network traffic for malicious activity and takes immediate action to block or prevent identified threats.

Example: automatically blocks traffic from a known malicious IP address to prevent a DDoS attack.

A

IPS (Intrusion Prevention System)

22
Q

A technology that allows users to access desktop environments hosted on remote servers, providing flexibility and centralized management of desktop systems.

A

VDI (Virtual Desktop Infrastructure)

23
Q

A network architecture that uses software to control and manage network resources dynamically, improving flexibility, scalability, and efficiency.

Example: Allows an administrator to configure and manage network traffic using software instead of manually configuring each hardware device.

A

SDN (Software-Defined Networking)

24
Q

A private, isolated section of a public cloud where users can deploy and manage resources, maintaining control over the network and security settings.

A

VPC (Virtual Private Cloud)

25
Q

A metric used in biometric security systems that measures the rate at which unauthorized individuals are incorrectly accepted as legitimate users.

A

FAR (False Acceptance Rate)

26
Q

The point at which the False Acceptance Rate (FAR) and False Rejection Rate (FRR) are equal, representing the system’s balance between accuracy and security.

A

CER (Crossover Error Rate)

27
Q

An error-detecting code used to verify the integrity of data by comparing a computed value to a known checksum to detect changes in the data.

A

CRC (Cyclic Redundancy Check)

28
Q

A metric used in biometric systems to measure the rate at which authorized users are incorrectly rejected or denied access.

A

FRR (False Rejection Rate)

29
Q

A set of technologies and processes used to streamline security operations by automating workflows, integrating security tools, and improving response times to incidents.

A

SOAR (Security Orchestration, Automation, and Response)

30
Q

A metric used in risk management to represent the percentage of asset value that could be lost due to a specific threat or incident.

A

EF (Exposure Factor)

31
Q

A security feature that prevents code from executing in certain regions of memory that should only contain data, helping protect against attacks like buffer overflows.

A

DEP (Data Execution Prevention)

32
Q

A security control that monitors and detects changes to files, configurations, or system settings, ensuring that unauthorized or malicious modifications are identified and reported.

A

FIM (File Integrity Monitoring)

33
Q

The process of distributing content from a source to multiple recipients or platforms, often used for delivering updated information such as news or blog posts.

A

Syndication

34
Q

A system that allows different organizations or domains to share resources, authentication, and user information securely, enabling single sign-on (SSO) across multiple systems.

A

Federation

35
Q

A relationship or connection between two or more entities, often used in the context of shared resources, collaborations, or trust.

A

Association

36
Q

The process of distributing or spreading information or changes across systems, networks, or domains. In cybersecurity, it often refers to how threats or updates spread across an environment.

A

Propagation

37
Q

An open standard for authorization that allows third-party applications to access a user’s resources without sharing their login credentials, typically using tokens instead of passwords.

A

OAuth

38
Q

An authentication protocol that allows users to authenticate once with a trusted identity provider (like Google or Facebook) and then access multiple third-party applications without needing to log in again.

A

OpenID

39
Q

An open standard for exchanging authentication and authorization data between parties, particularly between identity providers and service providers. This is commonly used in Single Sign-On (SSO) scenarios to enable users to authenticate once and access multiple applications.

A

SAML (Security Assertion Markup Language)

40
Q

The process of determining and enforcing the order in which tasks or operations are executed to achieve a desired outcome.

Example: Ensuring a backup job runs before a system update to preserve data integrity.

A

Sequencing

41
Q

The automated arrangement, coordination, and management of complex systems, services, or workflows to streamline operations.

Example: Managing the deployment of multiple containers across a cloud environment using Kubernetes.

A

Orchestration

42
Q

The use of tools or technology to perform tasks or processes without manual intervention.

Example: Configuring a system to automatically apply security patches as they become available.

A

Automation

43
Q

Writing small programs or scripts to automate repetitive tasks or configure systems efficiently.

Example: Creating a Python script to automate the generation of weekly system performance reports.

A

Scripting

44
Q

A detailed, step-by-step guide for performing specific operational tasks or resolving technical issues, often used in IT environments.

Example: A guide that outlines the exact steps to restart a database server after a failure.

A

Runbook

45
Q

A collection of strategies, processes, or workflows used to respond to specific scenarios, typically in cybersecurity or IT operations.

Example: Outlines procedures for handling a ransomware attack, including identifying infected systems and notifying stakeholders.

A

Playbook

46
Q

A software development methodology focusing on quick prototyping and iterative feedback to deliver applications faster and with higher user input.

A

RAD (Rapid Application Development)

47
Q

A structured process for designing, developing, testing, and maintaining software, consisting of stages like planning, analysis, design, implementation, testing, deployment, and maintenance.

A

SDLC (Software Development Life Cycle)

48
Q

A programming paradigm based on the concept of “objects,” which represent data and behavior, and principles like inheritance, encapsulation, and polymorphism.

A

OOP (Object-Oriented Programming)

49
Q

A cloud-based service model where users access software applications over the internet without managing the underlying infrastructure.

A

SaaS (Software as a Service)

50
Q

An industrial computer designed to control and automate machinery and processes in manufacturing, energy, and other industries. It operates in real-time and is highly reliable for repetitive tasks.

A

PLC (Programmable Logic Controller)

51
Q

An industrial computer used to automate and control machinery and processes in manufacturing environments.

Example: This controls the speed of a conveyor belt in an automated production line based on sensor data.

A

PLC - Programmable Logic Controller