SY0-701 : Objective 2.0 Flashcards
APT
Advanced Persistent Threat (APT)
- a broad term used to describe an attack campaign in which an intruder, or team of intruders, establishes an illicit, long-term presence on a network in order to mine highly sensitive data
OSINT
Open-Source Intelligence (OSINT)
- a cybersecurity tool that involves collecting and analyzing publicly available information to assess threats and identify vulnerabilities
SMS
Short Message Service (SMS)
IM
Instant Messaging (IM)
SPIM
Spam Over Internet Messaging (SPIM)
- a type of cyber security threat that involves unwanted messages sent to users of instant messaging (IM) services, SMS, or private messages on websites
MSP
Managed Service Provider (MSP)
- a third-party organization that manages your IT infrastructure remotely
EDR
Endpoint Detection and Response (EDR)
- a cybersecurity technology that helps detect and respond to threats on a network’s endpoints
XDR
Extended Detection and Response (XDR)
- a cybersecurity method that collects and analyzes data from multiple security sources to help identify and respond to threats
IPS
Intrusion Prevention System (IPS)
- a network security tool that monitors network activity for threats and takes action to prevent them
RFID
Radio Frequency Identifier (RFID)
DNS
Domain Name System (DNS)
- a critical component of the internet infrastructure that translates domain names into IP addresses
HIPS
Host-Based Intrusion Prevention System (HIPS)
- protects your system from malware and unwanted activity attempting to negatively affect your computer
HIDS
Host-Based Intrusion Detection System (HIDS)
- help organizations to monitor processes and applications running on devices such as servers and workstations
RAT
Remote Access Trojan (RAT)
SIEM
Security Information and Event Management (SIEM)
IPS
Intrusion Prevention System (IPS)
RDP
Remote Desktop Protocol (RDP)
- a network communication protocol that allows users to remotely control and operate computers
NTLM
New Technoloy LAN Manager (NTLM)
- is a suite of Microsoft security protocols intended to provide authentication, integrity, and confidentiality to users
SQL
Structured Query Language (SQL)
TLS
Transport Layer Security (TLS)
ACL
Access Control List (ACL)
- made up of rules that either allow access to a computer environment or deny it
DLL
Dynamic Link Library (DLL)
VLAN
Virtual Local Area Network (VLAN)
IoC
Indicators of Compromise (IoC)
UDP
User Datagram Protocol (UDP)
- a communication protocol used across the Internet for especially time-sensitive transmissions such as video playback or DNS lookups
TOC
Time-of-Check (TOC)
TOU
Time-of-Use (TOU)
TOE
Time-of-Evaluation (TOE)
MDM
Mobile Device Management (MDM)
- security software that enables IT departments to implement policies that secure, monitor, and manage end-user mobile devices
XSRF
Cross-site Request Forgery (XSRF)
- an attack vector that tricks a web browser into executing an unwanted action in an application to which a user is logged in
XSS
Cross-site Scripting (XSS)
ARP
Address Resolution Protocol (ARP)
- a protocol or procedure that connects an ever-changing Internet Protocol (IP) address to a fixed physical machine address, also known as a media access control (MAC) address, in a local-area network (LAN)
MAC
Media Access Control (MAC)
- refers to a unique identifier for devices on a network
DEP
Data Execution Prevention (DEP)
- a technology built into Windows that helps protect you from executable code launching from places it’s not supposed to
ASLR
Address Space Layout Randomization (ASLR)
- a memory-protection process for operating systems (OSes) that guards against buffer-overflow attacks by randomizing the location where system executables are loaded into memory
VDE
Virtual Desktop Environment (VDE)
VDI
Virtual Desktop Infrastructure (VDI)
SaaS
Software as a Service (SaaS)
PaaS
Platform as a Service (PaaS)
CSP
Cloud Service Provider (CSP)
NIST
National Institute of Standards and Technology (NIST)
SAN
Storage Area Network (SAN)
- a network of storage devices that can be accessed by multiple servers or computers, providing a shared pool of storage space
CASB
Cloud Access Security Broker (CASB)
- a security policy enforcement point positioned between enterprise users and cloud service providers
UEFI
Unified Extensible Firmware Interface (UEFI)
- it replaces the legacy BIOS format, serving as an interface between hardware and operating systems
MBR
Master Boot Record (MBR)
- data stored on a hard drive that is required for the booting process