SEC+ Acronyms Flashcards

Learn Acronyms

1
Q

FIM

A

File Integrity Monitoring [detects if files have been altered]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

NAC

A

Network Access Control [used to control access based on users and their devices]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

SPF

A

Sender Policy Framework [used to prevent email spoofing and phishing attacks]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

MFA

A

Multi-Factor Authentication [used to protects accounts in case another factor is compromised]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Logic Bomb

A

[code inserted into app or script set to execute in response to an event]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

RAT

A

Remote Access Trojan [malware that lets an attacker access a system remotely]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Evil Twin Attack

A

targets Wi-Fi networks by mimicking an existing network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Rootkit

A

Malware that gives a user administrative access to a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

DMZ

A

Demilitarized Zone [a screen subnet on a network that contains systems accessible by clients or other networks on the Internet]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

LAN

A

Local Area Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

VPN

A

Virtual Private Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Honeynets

A

Networks meant to distract attackers from legitimate networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Waterfall

A

methodology that includes multiple states, all of which feed into each other

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Scrum

A

a daily meeting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ESP

A

Encapsulating Security Payload [used to provide encryption of data and provide confidentiality]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

AH

A

Authentication Header [allows each of the hosts in the IPSec to authenticate with each other before exchanging data]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

IPS

A

Intrusion Prevention System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Static Code Analysis

A

testing method in which the app is not run but rather checked line by line.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Fuzz Testing

A

random characters are input into a computer program to find vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Dynamic Code Analysis

A

testing program while they’re running

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

AAA

A

Authentication, Authorization and Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

WPA3

A

used to encrypt Wi-Fi traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

WEP

A

outdated encryption method for Wi-Fi

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

RADIUS

A

protocol for authentication, authorization and accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

EAP-TLS

A

Extensible Authentication Protocol-Transport Layer Security [widely used authentication protocol in Wi-Fi networks]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Risk Transfer

A

transferring risk (entirely or partially) to another entity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Risk Mitigation

A

applying controls for a risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Risk Acceptance

A

not taking any additional actions to mitigate a risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

MTTR

A

Mean Time To Repair [the time needed to repair a failed device]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

MTTF

A

Mean Time To Failure [measure of reliability for devices that can’t be repaired]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

ARO

A

Annual Rate of Occurrence [number of times an incident occurs within a year]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

ALE

A

Annual Loss Expectancy [total loss in dollars expected due to a specific incident]

33
Q

MOA

A

Memorandum of Agreement [agreement between multiple entities that outlines in detail the roles and responsibilities of the parties]

34
Q

SLA

A

Service Level Agreement [outlines expectations of a vendor to a client]

35
Q

BPA

A

Business Partner Agreement [outlines obligations between business partners]

36
Q

MOU

A

Memorandum of Understanding [understanding between two or more parties that states their intention to work toward a specific goal]

37
Q

ISA

A

Interconnection Security Agreement [specifies security requirements for a connection between multiple entities]

38
Q

PaaS

A

Platform as a Service [cloud computing platform for developing applications]

39
Q

LDAP

A

Lightweight Directory Access Protocol [used for accessing and altering directory services data at the application layer]

40
Q

FDE

A

Full Device Encryption

41
Q

AUP

A

Acceptable Use Policy [outlines the rules and behaviors expected of those using company systems or networks]

42
Q

NDA

A

Non-Disclosure Agreement [states an individual will not share confidential and proprietary data but doesn’t outline how they should behave while using company systems]

43
Q

BYOD

A

Bring Your Own Device [policy that outlines how to manage and protect personal devices before the connect to the corporate network]

44
Q

CYOD

A

Choose Your Own Device [doesn’t allow users to use their own personal devices on the network]

45
Q

COPE

A

Corporate-Owned Personally Enabled [doesn’t allow personal devices on corporate network]

46
Q

CER

A

Crossover Error Rate [biometrics rate calculated by plotting FAR {False Acceptance Rate} and FRR {False Rejection Rate}]

47
Q

FAR

A

False Acceptance Rate [a higher FAR mean more unauthorized users are granted access]

48
Q

FRR

A

False Rejection Rate [means authorized users are not granted access]

49
Q

SHA

A

Secure Hash Algorithm [a hashing function used to verify data integrity]

50
Q

DH

A

Diffie-Hellman [a key exchange used for establishing a shared key]

51
Q

DES

A

Data Encryption Standard [encryption algorithm]

52
Q

AES

A

Advanced Encryption Standard [encryption algorithm]

53
Q

SSO

A

Single Sign-On [allow user to log into multiple systems after a single successful login]

54
Q

FTP

A

File Transfer Protocol [used to transfer files over a network]

55
Q

HMAC

A

Hash-Based Message Authentication [a hashing algorithm]

56
Q

MD5

A

Message Digest 5 [hashing algorithm]

57
Q

RIPEMD

A

RACE Integrity Primitives Evaluation Message Digest [hashing algorithm]

58
Q

SHA

A

Secure Hash Algorithm [a hashing algorithm]

59
Q

TPM

A

Trusted Platform Module [a hardware chip attached to a computer’s motherboard capable of storing keys for full disk encryption {FDE}]

60
Q

FDE

A

Full Disk Encryption

61
Q

MFD

A

Multi-Functional Device [a printer that also performs actions such as scanning, copying and faxing]

62
Q

SED

A

Self-Encrypting Drive [automatically encrypts data]

63
Q

DLP

A

Data Loss Prevention [used to actively identify and stop data exfiltration]

64
Q

OCSP

A

Online Certificate Status Protocol [gives real-time info on the status of a certificate]

65
Q

DAC

A

Discretionary Access Control [access control method where the owner of a file determines who can access]

66
Q

MAC

A

Mandatory Access Control [uses classification levels on resources and clearance levels on uses]

67
Q

RBAC

A

Role-Based Access Control [grants access based on a user’s defined role]

68
Q

ABAC

A

Attribute-Based Access Control [uses granular control based on attributes of users]

69
Q

DoS

A

Denial-of-Service [overloading an app or service on a system, which leads to resource exhaustion]

70
Q

IaaS

A

Infrastructure as a Service [provider give the customer computing resources such as servers, storage and networking]

71
Q

SaaS

A

Software as a Service [offers a full application to the customer]

72
Q

PaaS

A

Platform as a Service [offers an environment for developers to create application in the cloud]

73
Q

BaaS

A

Backup as a Service [offers solutions for backing up and restoring data]

74
Q

OSINT

A

Open-Source Intelligence Gathering [gathering intel through public sources]

75
Q

OWASP

A

Open Web Application Security Project [non-profit to help improve application security]

76
Q

ALE

A

Annualized Loss Expectancy

77
Q

SLE

A

Single Loss Expectancy

78
Q

ARO

A

Annualized Rate of Occurrence