Security+ Set C Flashcards

1
Q

C&C (command and control)

A

infrastructure of hosts and services with which attackers, direct, distribute, and control malware over botnets. Also known as C2.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

CA Certificate Authority

A

a server that guarantees subject identities by issuing signed digital certificate wrappers for their public keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

CAC (common access card)

A

certificate based authentication and supports two-factor authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

CAN (controller area network bus)

A

A serial network designed to allow communications between embedded programmable logic controllers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

CAPTCHA (completely automated public turing test to tell computers and humans apart)

A

difficult for computers to interpret

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

CASB (cloud access security broker)

A

enterprise management software designed to mediate access to cloud services by users across all types of devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

CBC (cipher block chaining)

A

an encryption mode of operation where an exclusive or (XOR) is applied to the first plaintext blockglossary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

CCMP (counter mode with cipher block chaining message authentication code protocol)

A

encryption protocol used for wireless LANs that addresses the vulnerabilities of the WEP protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

CE (cryptographic erase)

A

method of sanitizing a self-encrypting drive by erasing the media encryption key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

CHAP (challenge handshake authentication protocol)

A

for dial up networks that uses encrypted 3 way handshake to authenticate client to server. The challenge response is repeated through the connection to guard against replay attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

CIA Triad

A

Also known as AIC triad. principles of security control and management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

CIS (center for internet security)

A

not for profit organization. It publishes the well known top 20 critical security controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

CN (common name)

A

An X500 attribute expressing a host or user name, also used as the subject identifier for a digital certificate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

COBO (corporate owned, business only)

A

Enterprise mobile device provisioning model where the device is the property of the organization and personal use is prohibited.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

COPE (corporate owned, personally enabled)

A

Enterprise mobile device provisioning model where the device remains the property of the organization, but certain personal use, such as private email, social networking, web browsing is permitted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

CRL (certificate revocation list)

A

a list of certs that were revoked before their expiration date

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

CSP (cloud service provider)

A

vendor offering cloud models

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

CSR (cert signing request)

A

base64 ASCII file that subject sends to a CA to get a certificate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

CTI (cyber threat intel)

A

process of ivestigating, collecting, analyzing, and diseminating info about emerging threats and sources. also known as threat intel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

CVE (common vulnerabilities and exposures)

A

scheme for identifying vulnerabilities developed by MITRE and adopted by NIST

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

CVSS (common vulnerability scoring system)

A

risk mgmt. approach to quantifying vulnerability data and then taking into account the degree of risk to different types of systems or information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

CYOD (choose your own device)

A

enterprise mobile device provisioning model where employees are offered a selection of corporate devices for work and optionally private use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Cloud Security Alliance

A

industry body providing security guidance to CSPs, including enterprise reference architecture and security controls matrix.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Cuckoo

A

implementation of sandbox for malware analysis

25
Q

cable lock

A

physical secure against theft.

26
Q

captive portal

A

a web page or website to which a client is redirected before being granted full network access.

27
Q

capture the flag

A

training event where learners must identify a token within a live network environment

28
Q

card cloning skimming

A

duplicating smart card by reading the confidential data stored on it.

29
Q

carving

A

process of exgtracting data from a computer when that data has no associated file system metadata

30
Q

cat command

A

linux command to view and combine (concatenate) files.

31
Q

chain of custody

A

the record of evidence history from collection, to presentation in court, to disposal

32
Q

change control

A

process by which the need for change is recorded and approved.

33
Q

change mgmt.

A

process through which changes to configuration of info systems are implemented,.

34
Q

checksum

A

output of a hash function. chmod Linux command for managing file permissions.

35
Q

circuit-level stateful inspection firewall

A

a Layer 5 firewall technology that tracks the active state of a connection, and can make decisions based on the contents of network traffic as it relates to the state of the connection.

36
Q

clean desk policy

A

organizational policy that mandates employee work areas be free from potentially sensitive information; sensitive docs must not be left out hwere unauthorized personnel might see them.

37
Q

cloud deployment model

A

classifying the ownership and managemtn of a cloud as public, private, community, or hybrid

38
Q

cloud service model

A

classifying the provision of cloud services and the limit of the provider’s responsibility as a software, platform, infrastructure and so on.

39
Q

code of conduct

A

professional behavior depend s on basic ethical standards.

40
Q

code reuse

A

potentially unsecure programming practice of using code originally written for a different context.

41
Q

code signing

A

method of using a digital signature to ensure the source and integrity of programming code.

42
Q

cold site

A

predetermined alternate location where a network can be rebuilt after a disaster.

43
Q

collector

A

network appliance that gathers or receives log and/or state data from other network systems

44
Q

collision

A

in cryptography, the act of two different plaintext inputs producing the same exact ciphertext output.

45
Q

community cloud

A

cloud deployed for shared use by cooperating tenants

46
Q

compensating control

A

security measure that takes on risk mitigation when a primary control fails or cannot completely meet expectations

47
Q

confidentiality

A

keeping info and comm private and protecting them from unauthorized access.

48
Q

content filter

A

software app or gateway that filters client requests for various types of internet content.

49
Q

context-aware authentication

A

access control scheme that verifies an objects identity based on various environmental facgtors, like time, location, and behavior

50
Q

continuous delivery

A

software development method in which app and platform requirements are frequently tested and validated for immediate availability

51
Q

continuous deployment

A

software development method in which app and platform updates are committed to production rapidly

52
Q

continuous integration

A

method in which code updates are tested and committed to a development or build server/code repository rapidly.

53
Q

continuous monitoring

A

constantly evaluating an environment for changes so that new risks may be more quicky detected and business operations improved upon. Also known as continuous security monitoring.

54
Q

control risk

A

risk that arises when a control does not provide the level of mitigation that was expecgted

55
Q

corrective control

A

control that acts after an incident to eliminate or minimize its impact.

56
Q

counter mode (CTM)

A

encryption mode of operation where a numerical counter value is used to create a constantly changing IV

57
Q

credential stuffing

A

brute force attack in which stolen user account names and passwords are tested against multiple websites

58
Q

crossover error rate

A

biometric evaluation factor expressing the point at which FAR and FRR meet, with a low value indicating better performance.

59
Q

curl command

A

utility for command-line manipulation of URL-based protocol requests.