S Flashcards

1
Q

S/MIME

A

Secure/Multipurpose Internet Mail Extensions

The standard form of messaging with encryption or
digital signatures that requires public and private keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

SaaS

A

Software as a Service

A minimal cloud asset that allows access to one
application or port.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

SAE

A

Simultaneous Authentication of Equals

Based upon Dragonfly, this key management system
incorporates elements of Diffie Hellman and is a part of
WPA3.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

SAML

A

Security Assertions Markup Language

A method of exchanging credentials via a trusted
authentication service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

SAN

A

Storage Area Network

A remote file system access via Internet-based
protocols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

SAN

A

Subject Alternative Name

Embedding multiple names for server within a single
certificate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

SCADA

A

System Control and Data Acquisition

Industrial controls automation the network-based
management systems that control many remote, small,
embedded devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

SCAP

A

Security Content Automation Protocol

This is a framework promoted by the US government to
create open standards for the automation of information
assurance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SCEP

A

Simple Certificate Enrollment Protocol

This is a technology that is highly resistant to dictionary
attacks and is designed to replace Pre-shared Keys and
WPA2-Personal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

SCP

A

Secure Copy

A command line application that will securely upload or
download files to work from a remote host.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

SCSI

A

Small Computer System Interface

A host bus interface to connect to multiple hard drives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

SDK

A

Software Development Kit

Tools, APIs and applications created by a vendor to
allow development and customization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

SDLC

A

Software Development Life Cycle

The sequence of processes involved in the creation and
management of software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

SDLM

A

Software Development Life-cycle Methodology

The stages or phases of a software-based application as
it goes from inception to maintenance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

SDN

A

Software Defined Network

Using virtualization to create, manage and secure
networks between various systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SDP

A

Service Delivery Platform

The elements that provide service delivery, session
management and other key components to a client.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

SDV

A

Software-defined Visibility

The capability implemented with software that allows
for the organization to closely inspect network traffic
from an array of collectors and sensors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

SED

A

Self-Encrypting Drives

Storage devices that are capable of implementing high-
grade encryption without additional software or resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

SHE

A

Structured Exception Handler

This is the facility within Windows that identifies
memory corruption and contingencies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

SFTP

A

Secured File Transfer Protocol

This application runs over TCP/22 and encrypts control
and data functions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

SHA

A

Secure Hashing Algorithm

A now deprecated hashing algorithm that has been in
very common use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

SIEM

A

Security Information and Event Management

These servers collect, aggregate and analyze data from
multiple sources to identify threats and dangerous
trends.

23
Q

SIM

A

Subscriber Identity Module

An integrated circuit that identifies a phone and
subscriber.

24
Q

SIP

A

Session Initiation Protocol

This is used to signal, start up, maintain and terminate
real-time communication services between endpoints
using Internet protocol.

25
Q

SLA

A

Service Level Agreement

An agreement on the characteristics of quality and
performance between two parties.

26
Q

SLE

A

Single Loss Expectancy

The value of an asset multiplied times the exposure
factor.

27
Q

SMB

A

Server Message Block

This is a core Microsoft protocol used for general access
and authentication.

28
Q

S/MIME

A

Secure/Multipurpose Internet Mail Extensions

Developed by RSA, this is a formatting standard
originally created for implementing digital signatures
and encryption with public key infrastructure.

29
Q

SMS

A

Short Message Service

Protocol used by cell phones to exchange brief text-
based messages.

30
Q

SMTP

A

Simple Mail Transfer Protocol

The vulnerable application responsible for forwarding
email to a destination server or receiving it from a
sender.

31
Q

SMTPS

A

Simple Mail Transfer Protocol Secure

The secured application responsible for forwarding
email to a destination server or receiving it from a
sender.

32
Q

SNMP

A

Simple Network Management Protocol

A network-based application designed to discover
device status, change configuration and receive errors
and exceptions.

33
Q

SOAP

A

Simple Object Access Protocol

The structured markup used to identify components of
service oriented architecture messages.

34
Q

SOAR

A

Security Orchestration, Automation, Response

A software architecture designed to allow an
organization to collect and analyze threat information
from numerous sources and inputs, as well as respond to
incidents

35
Q

SoC

A

System on Chip

The minimization of an application and operating
system to a state that will fit on an integrated circuit.

36
Q

SOC

A

Security Operations Center

This is a hub of operations and communication that
focuses on security incidents and management at a
technical level.

37
Q

SPF

A

Sender Policy Framework

An email validation architecture designed to detect and
eliminate spoofing and spamming through approved
mail exchangers.

38
Q

SPIM

A

Spam over Internet Messaging

Chat messages delivered as a hoax were to induce
purchase.

39
Q

SPIT

A

Spam over Internet Telephony

The use of SMS to deliver unwanted messages.

40
Q

SPoF

A

Single Point of Failure

A device, business process or person that is critical to a
business and has no redundancy.

41
Q

SQL

A

Structured Query Language

An industry-standard mass information repository
retrieval system.

42
Q

SQLi

A

SQL injection

Manipulation of input to the front end of a server in
order to gain access to the data repositories.

43
Q

SRTP

A

Secure Real-Time Protocol

A secure form of Internet protocol-based telephony.

44
Q

SSD

A

Solid State Drive

Nonvolatile storage using persistent solid-state flash
memory to store and retrieve information.

45
Q

SSH

A

SSH

This protocol, runs over TCP/22 and encrypts its
exchanges.

46
Q

SSID

A

Service Set Identifier

An identifier for a wireless network.

47
Q

SSL

A

Secure Sockets Layer

A certificate-based authentication and encryption
application that would securely process any TCP-based
layer 7 protocol.

48
Q

SSO

A

Single Sign-on

An authentication architecture that relies on a central
system and it’s authentication to authorize users for
other services using a single set of credentials.

49
Q

STIX

A

Structured Threat Information eXpression

Developed by OASIS and MITRE, this is an
international standard for sharing intelligence and threat
information

50
Q

Stego

A

Stenography

The obfuscation of information within a common
looking format that achieves stealth.

51
Q

STP

A

Shielded Twisted Pair

Four pairs of wires wrapped in foil that is grounded to
prevent interference and eavesdropping.

52
Q

Symmetric key

A

Secret key

The use of a single value to hide and then reveal
information.

53
Q

SWG

A

Secure Web Gateway

A system used by enterprises to protect the intranet
from hostile or unsecured traffic, commonly
implemented in a cloud-based solution.