Key Cybersecurity Acronyms and Concepts Flashcards

1
Q

What does SIEM stand for?

A

Security Information and Event Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does SOAR stand for?

A

Security Orchestration, Automation, and Response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does IDS/IPS stand for?

A

Intrusion Detection System / Intrusion Prevention System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does EDR stand for?

A

Endpoint Detection and Response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does IOC and IOA stand for?

A

Indicator of Compromise and Indicator of Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does APT stand for?

A

Advanced Persistent Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does MITRE ATT&CK stand for?

A

MITRE Adversarial Tactics, Techniques, and Common Knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does CVSS stand for?

A

Common Vulnerability Scoring System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does CVE stand for?

A

Common Vulnerabilities and Exposures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does TTP stand for?

A

Tactics, Techniques, and Procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does NIST CSF stand for?

A

National Institute of Standards and Technology Cybersecurity Framework

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does RBAC stand for?

A

Role-Based Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does BIA stand for?

A

Business Impact Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does PKI stand for?

A

Public Key Infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does TLS/SSL stand for?

A

Transport Layer Security / Secure Sockets Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does OSINT stand for?

A

Open-Source Intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What does NAC stand for?

A

Network Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What does OWASP stand for?

A

Open Web Application Security Project

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What does GDPR stand for?

A

General Data Protection Regulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What does SAST and DAST stand for?

A

Static Application Security Testing and Dynamic Application Security Testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What does RTO and RPO stand for?

A

Recovery Time Objective and Recovery Point Objective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What does SLA stand for?

A

Service Level Agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What does DLP stand for?

A

Data Loss Prevention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What does XDR stand for?

A

Extended Detection and Response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What does DNS stand for?
Domain Name System
26
What does SIEM EDR stand for?
Security Information and Event Management Endpoint Detection and Response
27
What is threat intelligence?
Information about existing or emerging threats used to improve defensive strategies.
28
Define “lateral movement.”
The process by which attackers navigate through a network after initial compromise to gain further access.
29
What is a vulnerability?
A weakness in a system, application, or network that can be exploited by a threat actor.
30
Define “incident response.”
The process of identifying, managing, and mitigating security incidents.
31
What is defense-in-depth?
A security strategy that uses multiple layers of defenses to protect assets.
32
Define “zero-trust architecture.”
A security model that assumes no user or device should be trusted by default, even inside the network.
33
What is a playbook?
A documented set of procedures for responding to specific security incidents.
34
What is phishing?
A social engineering attack in which attackers trick individuals into providing sensitive information.
35
Define “penetration testing.”
Simulated cyberattacks designed to identify vulnerabilities in systems or networks.
36
What is encryption?
The process of converting data into a coded format to prevent unauthorized access.
37
Define “social engineering.”
Psychological manipulation of individuals to gain access to sensitive information.
38
What is a SIEM system used for?
Aggregating and analyzing security data to detect and respond to threats.
39
What is malware?
Malicious software designed to disrupt, damage, or gain unauthorized access to systems.
40
What is port scanning?
A technique used to identify open ports and services on a network.
41
What is the principle of least privilege?
Providing users and systems only the access they need to perform their job.
42
Define “multi-factor authentication (MFA).”
A security mechanism requiring multiple forms of verification to gain access.
43
What is DNS spoofing?
A type of attack where fake DNS responses are sent to redirect users to malicious sites.
44
Define “spear phishing.”
A targeted phishing attack aimed at specific individuals or organizations.
45
What is a honeypot?
A decoy system or resource set up to attract and study attackers.
46
Define “cyber kill chain.”
A framework describing the stages of a cyberattack, from reconnaissance to exploitation.
47
What is a vulnerability scan?
An automated process that identifies vulnerabilities in systems or networks.
48
Define “exfiltration.”
The unauthorized transfer of data from a system or network.
49
What is endpoint detection and response (EDR)?
A solution for monitoring and protecting endpoints (e.g., laptops, servers) against cyber threats.
50
What is risk assessment?
The process of identifying, evaluating, and prioritizing risks to organizational assets.
51
What is a SIEM correlation rule?
A set of conditions that define suspicious or malicious activity in logs and events.
52
What is the MITRE ATT&CK framework?
A matrix that categorizes adversarial behaviors into Tactics, Techniques, and Procedures (TTPs).
53
What is the OWASP Top 10?
A list of the most critical security risks to web applications.
54
What is the NIST CSF?
A cybersecurity framework from the National Institute of Standards and Technology used for risk management.
55
What is ISO 27001?
An international standard for Information Security Management Systems (ISMS).
56
What are log aggregation tools used for?
Collecting and analyzing logs to identify patterns, threats, or anomalies.
57
What is Nessus?
A vulnerability scanning tool used to identify weaknesses in systems.
58
What is Splunk?
A tool for log aggregation and analysis used in SIEM implementations.
59
What is OpenVAS?
An open-source tool for performing vulnerability assessments.
60
What is the CIS Controls framework?
A prioritized set of cybersecurity best practices created by the Center for Internet Security.
61
What is COBIT?
A framework for governance and management of enterprise IT.
62
What is PCI DSS?
The Payment Card Industry Data Security Standard, which protects payment card information.
63
What is the Cyber Kill Chain?
A model developed by Lockheed Martin to describe the stages of a cyberattack.
64
What is Wireshark?
A network protocol analyzer used for packet capture and analysis.
65
What is Netcat?
A networking tool for reading and writing data across network connections.
66
What is Burp Suite?
A web vulnerability scanner and penetration testing tool.
67
What is Metasploit?
A penetration testing framework for exploiting vulnerabilities.
68
What is the ELK Stack?
A log management suite composed of Elasticsearch, Logstash, and Kibana.
69
What is Graylog?
An open-source log management and analysis tool.
70
What is Kali Linux?
A Linux distribution used for penetration testing and security auditing.
71
What is Responder?
A tool used for performing man-in-the-middle attacks on Windows authentication protocols.
72
What is the Cloud Security Alliance (CSA)?
An organization that promotes best practices for secure cloud computing.
73
What is Cyber Threat Intelligence (CTI)?
Information used to understand and mitigate security threats.
74
What is the Common Vulnerability Scoring System (CVSS)?
A framework for assigning severity scores to vulnerabilities.
75
What is Snort?
An open-source intrusion detection and prevention system.
76
What is Zeek (formerly Bro)?
A network analysis framework focused on security monitoring.
77
What is the SCAP framework?
The Security Content Automation Protocol, used for automating security assessments.
78
What is OSSEC?
An open-source host-based intrusion detection system (HIDS).
79
What is Cuckoo Sandbox?
A tool for analyzing malware by running it in a controlled environment.
80
What is Nessus Agent?
A lightweight endpoint agent designed to run on individual systems for vulnerability scanning.