SY0-701 : Objective 2.0 Flashcards

1
Q

APT

A

Advanced Persistent Threat (APT)
- a broad term used to describe an attack campaign in which an intruder, or team of intruders, establishes an illicit, long-term presence on a network in order to mine highly sensitive data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

OSINT

A

Open-Source Intelligence (OSINT)
- a cybersecurity tool that involves collecting and analyzing publicly available information to assess threats and identify vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

SMS

A

Short Message Service (SMS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

IM

A

Instant Messaging (IM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

SPIM

A

Spam Over Internet Messaging (SPIM)
- a type of cyber security threat that involves unwanted messages sent to users of instant messaging (IM) services, SMS, or private messages on websites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

MSP

A

Managed Service Provider (MSP)
- a third-party organization that manages your IT infrastructure remotely

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

EDR

A

Endpoint Detection and Response (EDR)
- a cybersecurity technology that helps detect and respond to threats on a network’s endpoints

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

XDR

A

Extended Detection and Response (XDR)
- a cybersecurity method that collects and analyzes data from multiple security sources to help identify and respond to threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

IPS

A

Intrusion Prevention System (IPS)
- a network security tool that monitors network activity for threats and takes action to prevent them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

RFID

A

Radio Frequency Identifier (RFID)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

DNS

A

Domain Name System (DNS)
- a critical component of the internet infrastructure that translates domain names into IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

HIPS

A

Host-Based Intrusion Prevention System (HIPS)
- protects your system from malware and unwanted activity attempting to negatively affect your computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

HIDS

A

Host-Based Intrusion Detection System (HIDS)
- help organizations to monitor processes and applications running on devices such as servers and workstations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

RAT

A

Remote Access Trojan (RAT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

SIEM

A

Security Information and Event Management (SIEM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

IPS

A

Intrusion Prevention System (IPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

RDP

A

Remote Desktop Protocol (RDP)
- a network communication protocol that allows users to remotely control and operate computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

NTLM

A

New Technoloy LAN Manager (NTLM)
- is a suite of Microsoft security protocols intended to provide authentication, integrity, and confidentiality to users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

SQL

A

Structured Query Language (SQL)

19
Q

TLS

A

Transport Layer Security (TLS)

20
Q

ACL

A

Access Control List (ACL)
- made up of rules that either allow access to a computer environment or deny it

21
Q

DLL

A

Dynamic Link Library (DLL)

22
Q

VLAN

A

Virtual Local Area Network (VLAN)

23
Q

IoC

A

Indicators of Compromise (IoC)

24
Q

UDP

A

User Datagram Protocol (UDP)
- a communication protocol used across the Internet for especially time-sensitive transmissions such as video playback or DNS lookups

25
Q

TOC

A

Time-of-Check (TOC)

26
Q

TOU

A

Time-of-Use (TOU)

27
Q

TOE

A

Time-of-Evaluation (TOE)

28
Q

MDM

A

Mobile Device Management (MDM)
- security software that enables IT departments to implement policies that secure, monitor, and manage end-user mobile devices

29
Q

XSRF

A

Cross-site Request Forgery (XSRF)
- an attack vector that tricks a web browser into executing an unwanted action in an application to which a user is logged in

30
Q

XSS

A

Cross-site Scripting (XSS)

31
Q

ARP

A

Address Resolution Protocol (ARP)
- a protocol or procedure that connects an ever-changing Internet Protocol (IP) address to a fixed physical machine address, also known as a media access control (MAC) address, in a local-area network (LAN)

32
Q

MAC

A

Media Access Control (MAC)
- refers to a unique identifier for devices on a network

33
Q

DEP

A

Data Execution Prevention (DEP)
- a technology built into Windows that helps protect you from executable code launching from places it’s not supposed to

34
Q

ASLR

A

Address Space Layout Randomization (ASLR)
- a memory-protection process for operating systems (OSes) that guards against buffer-overflow attacks by randomizing the location where system executables are loaded into memory

35
Q

VDE

A

Virtual Desktop Environment (VDE)

36
Q

VDI

A

Virtual Desktop Infrastructure (VDI)

37
Q

SaaS

A

Software as a Service (SaaS)

38
Q

PaaS

A

Platform as a Service (PaaS)

39
Q

CSP

A

Cloud Service Provider (CSP)

40
Q

NIST

A

National Institute of Standards and Technology (NIST)

41
Q

SAN

A

Storage Area Network (SAN)
- a network of storage devices that can be accessed by multiple servers or computers, providing a shared pool of storage space

42
Q

CASB

A

Cloud Access Security Broker (CASB)
- a security policy enforcement point positioned between enterprise users and cloud service providers

43
Q

UEFI

A

Unified Extensible Firmware Interface (UEFI)
- it replaces the legacy BIOS format, serving as an interface between hardware and operating systems

44
Q

MBR

A

Master Boot Record (MBR)
- data stored on a hard drive that is required for the booting process