Glossary T-U-V-W-X-Z Flashcards

1
Q

TACACS+ (Terminal Access Controller Access Control System Plus)

A

An AAA protocol developed by Cisco that is often used to authenticate to administrator accounts for network appliance management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

tail command

A

Linux utility for showing the last lines in a file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

tailgating

A

Social engineering technique to gain access to a building by following someone who is unaware of their presence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

TAP (test access port)

A

A hardware device inserted into a cable to copy frames for analysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

tape

A

Tape media provides robust, high-speed, high-capacity backup storage. Tape drives and autoloader libraries can be connected to the SATA and SAS buses or accessed via a SAN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

TAXII (Trusted Automated eXchange of Indicator Information)

A

A protocol for supplying codified information to automate incident detection and analysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

tcpdump command

A

A command-line packet sniffing utility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

tcpreplay command

A

A command-line utility that replays packets saved to a file back through a network adapter.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

technical control

A

A category of security control that is implemented as a system (hardware, software, or firmware). Technical controls may also be described as logical controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

tethering

A

Using the cellular data plan of a mobile device to provide Internet access to a laptop or PC. The PC can be tethered to the mobile by USB, Bluetooth, or Wi-Fi (a mobile hotspot). Also known as hotspot.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

theHarvester

A

Utility for gathering results from open source intelligence queries

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

thin AP

A

An access point that requires a wireless controller in order to function.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

third-party risks

A

Vulnerabilities that arise from dependencies in business relationships with suppliers and customers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

threat actor

A

The person or entity responsible for an event that has been identified as a security incident or as a risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

threat hunting

A

Cybersecurity technique designed to detect presence of threats that have not been discovered by normal security monitoring.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

threat map

A

Animated map showing threat sources in near real-time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

time of day restrictions

A

Policies or configuration settings that limit a user’s access to resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

time offset

A

In forensics, identifying whether a time zone offset has been applied to a file’s time stamp.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

timeline

A

In digital forensics, a tool that shows the sequence of file system events within a source image in a graphical format.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

TKIP (Temporal Key Integrity Protocol)

A

A mechanism used in the first version of WPA to improve the security of wireless encryption mechanisms, compared to the flawed WEP standard.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

TLS (Transport Layer Security)

A

A security protocol that uses certificates for authentication and encryption to protect web communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

TOCTTOU (time of check to time of use)

A

The potential vulnerability that occurs when there is a change between when an app checked a resource and when the app used the resource.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

token

A

A physical or virtual item that contains authentication and/or authorization data, commonly used in multifactor authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

tokenization

A

A deidentification method where a unique token is substituted for real data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

TOTP (Time-based One-time Password)

A

An improvement on HOTP that forces one-time passwords to expire after a short period of time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

TPM (Trusted Platform Module)

A

A specification for hardware-based storage of digital certificates, keys, hashed passwords, and other user and platform identification information.transit gateway In cloud computing, a virtual router deployed to facilitate connections between VPC subnets and VPN gateways.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

trend analysis

A

The process of detecting patterns within a dataset over time, and using those patterns to make predictions about future events or better understand past events.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Trojan

A

A malicious software program hidden within an innocuous-seeming piece of software. Usually, the Trojan is used to try to compromise the security of the target computer. Also known as Trojan.

29
Q

TTP (tactics, techniques, and procedures)

A

Analysis of historical cyber-attacks and adversary actions.

30
Q

typosquatting

A

An attack—also called typosquatting—in which an attacker registers a domain name with a common misspelling of an existing domain, so that a user who misspells a URL they enter into a browser is taken to the attacker’s website. Also known as URL hijacking.

31
Q

UEBA (user and entity behavior analytics)

A

A system that can provide automated identification of suspicious activity by user accounts and computer hosts.

32
Q

UEM (unified endpoint management)

A

Enterprise software for controlling device settings, apps, and corporate data storage on all types of fixed, mobile, and IoT computing devices.

33
Q

USB data blocker (Universal Serial Bus data blocker)

A

Hardware plug to prevent malicious data transfer when a device is plugged into a USB charging point.

34
Q

UTM (unified threat management)

A

All-in-one security appliances and agents that combine the functions of a firewall, malware scanner, intrusion detection, vulnerability scanner, data loss prevention, content filtering, and so on.

35
Q

vault

A

A secure room with walls and gateway hardened against physical assault.

36
Q

VBA (Visual Basic for Applications)

A

Programming languages used to implement macros and scripting in Office document automation.

37
Q

VDE (virtual desktop environment)

A

The user desktop and software applications provisioned as an instance under VDI.

38
Q

VDI (virtual desktop infrastructure)

A

A virtualization implementation that separates the personal computing environment from a user’s physical computer.

39
Q

vendor management

A

Policies and procedures to identify vulnerabilities and ensure security of the supply chain.

40
Q

virus

A

Code designed to infect computer files (or disks) when it is activated.

41
Q

vishing

A

A human-based attack where the attacker extracts information while speaking over the phone or leveraging IP-based voice messaging services (VoIP).

42
Q

VLAN (virtual local area network)

A

A logically separate network, created by using switching technology. Even though hosts on two VLANs may be physically connected to the same cabling, local traffic is isolated to each VLAN so they must use a router to communicate.

43
Q

VM escaping (virtual machine escaping)

A

An attack where malware running in a VM is able to interact directly with the hypervisor or host kernel.

44
Q

VM sprawl (virtual machine sprawl)

A

Configuration vulnerability where provisioning and deprovisioning of virtual assets is not properly authorized and monitored.

45
Q

VPC (virtual private cloud)

A

A private network segment made available to a single cloud consumer on a public cloud.

46
Q

VPN (virtual private network)

A

A secure tunnel created between two endpoints connected via an unsecure network (typically the Internet).

47
Q

vulnerability

A

A weakness that could be triggered accidentally or exploited intentionally to cause a security breach.

48
Q

vulnerability assessment

A

An evaluation of a system’s security and ability to meet compliance requirements based on the configuration state of the system, as represented by information collected from the system.

49
Q

WAF (web application firewall)

A

A firewall designed specifically to protect software running on web servers and their back-end databases from code injection and DoS attacks.

50
Q

war driving

A

The practice of using a Wi-Fi sniffer to detect WLANs and then either making use of them (if they are open/unsecured) or trying to break into them (using WEP and WPA cracking tools).

51
Q

warm site

A

A location that is dormant or performs noncritical functions under normal conditions, but which can be rapidly converted to a key operations site if needed.

52
Q

watering hole attack

A

An attack in which an attacker targets specific groups or organizations, discovers which websites they frequent, and injects malicious code into those sites.

53
Q

WEP (Wired Equivalent Privacy)

A

A legacy mechanism for encrypting data sent over a wireless connection.

54
Q

whaling

A

An email-based or web-based form of phishing which targets senior executives or wealthy individuals.

55
Q

white team

A

Staff administering, evaluating, and supervising a penetration test or incident response exercise.

56
Q

WinHex

A

Forensics tool for Windows that allows collection and inspection of binary code in disk and memory images.

57
Q

worm

A

A type of malware that replicates in system memory and can spread over network connections rather than infecting files.

58
Q

WPA (Wi-Fi Protected Access)

A

Standards for authenticating and encrypting access to Wi-Fi networks. Also known as WPA2, WPA3.

59
Q

WPS (Wi-Fi Protected Setup)

A

A feature of WPA and WPA2 that allows enrollment in a wireless network based on an 8-digit PIN.

60
Q

XaaS (anything as a service)

A

Expressing the concept that most types of IT requirements can be deployed as a cloud service model.

61
Q

XML injection

A

Attack method where malicious XML is passed as input to exploit a vulnerability in the target app.

62
Q

XOR (exclusive OR)

A

An operation that outputs to true only if one input is true and the other input is false.

63
Q

XSRF (cross-site request forgery)

A

A malicious script hosted on the attacker’s site that can exploit a session started on another site in the same browser. Also known as client-side request forgery or CSRF.

64
Q

XSS (cross-site scripting)

A

A malicious script hosted on the attacker’s site or coded in a link injected onto a trusted site designed to compromise clients browsing the trusted site, circumventing the browser’s security model of trusted zones.

65
Q

zero trust

A

Security design paradigm where any request (host-to-host or container-to-container) must be authenticated before being allowed.

66
Q

zero-day

A

A vulnerability in software that is unpatched by the developer or an attack that exploits such a vulnerability.

67
Q

zero-fill

A

A method of sanitizing a drive by setting all bits to zero.

68
Q

ZigBee

A

Low-power wireless communications open source protocol used primarily for home automation. ZigBee uses radio frequencies in the 2.4 GHz band and a mesh topology.

69
Q

Z-Wave

A

Low-power wireless communications protocol used primarily for home automation. Z-Wave uses radio frequencies in the high 800 to low 900 MHz and a mesh topology.