Security+ (SY0-601) Acronym List Flashcards

1
Q

SOAR

A

Security Orchestration, Automation, Response
a collection of software solutions and tools that allow organizations to streamline security operations in three key areas: threat and vulnerability management, incident response, and security operations automation.

SOAR helps organisations to reduce mean time to detect (MTTD) and mean time to respond (MTTR) by enabling security alerts to be qualified and remediated in minutes, rather than days, weeks and months. SOAR also enables security teams to automate incident response procedures (known as playbooks).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Code refactoring

A

In computer programming and software design, code refactoring is the process of restructuring existing computer code—changing the factoring—without changing its external behavior. Refactoring is intended to improve the design, structure, and/or implementation of the software, while preserving its functionality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

PFS

A

Perfect Forward Secrecy
In cryptography, forward secrecy, also known as perfect forward secrecy, is a feature of specific key agreement protocols that gives assurances that session keys will not be compromised even if long-term secrets used in the session key exchange are compromised.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Regression testing

A

Regression testing is re-running functional and non-functional tests to ensure that previously developed and tested software still performs after a change. If not, that would be called a regression.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

RAS

A

Remote Access Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

PUP

A

Potentially Unwanted ProgramPUPs is the acronym for Potentially Unwanted Programs. Also called bundleware, junkware, or PUAs (Potentially Unwanted Applications), PUPs are software programs that you likely didn’t want installed on your computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

MTBF

A

Mean Time Between Failures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

PAP

A

Password Authentication Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SCAP

A

Security Content Automation Protocol(SCAP) is a multi-purpose framework of specifications that supports automated configuration, vulnerability and patch checking, technical control compliance activities, and security measurement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

PoC

A

Proof of Concept

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

IDEA

A

International Data Encryption AlgorithmInternational Data Encryption Algorithm (IDEA) is a once-proprietary free and open block cipher that was once intended to replace Data Encryption Standard (DES). Once called Improved Proposed Encryption Standard (IPES)I, DEA is a minor revision to the Proposed Encryption Standard (PES).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

3DES

A

Triple Data Encryption Standard
Triple Data Encryption Standard (DES) is a type of computerized cryptography where block cipher algorithms are applied three times to each data block. The key size is increased in Triple DES to ensure additional security through encryption capabilities. … Three keys are referred to as bundle keys with 56 bits per key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

BIOS

A

Basic Input/Output System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

DBA

A

Database Administrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

IAM

A

Identity and Access Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

UTM

A

Unified Threat Management(UTM) is an approach to information security where a single hardware or software installation provides multiple security functions .

17
Q

staging server

A

A staging server is a type of server that is used to test a software, website or service in a production-similar environment before being set live. It is part of a staging environment or staging site, where it serves as a temporary hosting and testing server for any new software or websites.

18
Q

fuzz testing

A
Fuzz testing is used to identify coding
errors and security loopholes in an application.
By inputting a massive amount of random
data to the system in an attempt to make
it crash to identify if anything breaks
in the application
19
Q

symmetric encryption

A

Blowfish, AES, RC4, DES, RC5, and RC6 are examples of symmetric encryption. The most widely used symmetric algorithm is AES-128, AES-192, and AES-256. The main disadvantage of the symmetric key encryption is that all parties involved have to exchange the key used to encrypt the data before they can decrypt it.

20
Q

WAF

A

Web Application Firewall

21
Q

SQLi

A

SQL Injection

22
Q

asymmetric encryption

A

Asymmetric Key Encryption is based on public and private key encryption technique. It uses two different key to encrypt and decrypt the message.
Examples: Diffie-Hellman, ECC, El Gamal, DSA and RSA

23
Q

SDN

A

Software-defined Networking

24
Q

NGFW

A

Next-generation Firewall

25
Q

WIPS

A

Wireless Intrusion Prevention System

26
Q

UEM

A

Unified Endpoint Management

27
Q

RTOS

A

Real-time Operating System