SY0-701: Objective 4.0 Flashcards

1
Q

SNMP

A

Simple Network Management Protocol (SNMP)
- an internet standard protocol used to monitor and manage network devices connected over an IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

API

A

Application Programming Interface (API)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

RSH

A

Remote Shell (RSH)
- a tool for remotely running a command on a remote computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

FTP

A

File Transfer Protocol (FTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

OAuth

A

Open Authorization (OAuth)
- a widely adopted authorization framework that allows you to consent to an application interacting with another on your behalf without having to reveal your password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

WPA

A

Wi-Fi Protected Access (WPA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

WEP

A

Wired Equivalent Privacy (WEP)
- a type of wireless security algorithm designed to encrypt and protect all data transmitted over a secure network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

BYOD

A

Bring Your Own Device (BYOD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

COPE

A

Corporate Owned, Personally Enabled (COPE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

CYOD

A

Choose Your Own Device (CYOD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

POP

A

Post Office Protocol (POP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

LDAP

A

Lightweight Directory Access Protocol (LDAP)
- a vendor-neutral software protocol used to lookup information or devices within a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

VPC

A

Virtual Private Cloud (VPC)
- a private cloud computing environment contained within a public cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

ATT&CK

A

Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK)
- a knowledge base and framework that helps organizations understand how cyber attackers operate and improve their cybersecurity strategies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

CVSS

A

Common Vulnerability Scoring System (CVSS)
- a free and open industry standard for assessing the severity of computer system security vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SCAP

A

Security Content Automation Protocol (SCAP)
- a protocol currently consisting of a suite of seven specifications that standardize the format and nomenclature by which security software communicates information about software flaws and security configurations

17
Q

PAM

A

Privileged Access Management (PAM)
- a cybersecurity system that monitors, detects, and prevents unauthorized access to critical resources

18
Q

SAE

A

Simultaneous Authentication of Equals (SAE)
- a secure key exchange protocol used in Wi-Fi networks to prevent man-in-the-middle attacks by simultaneously authenticating both parties

19
Q

CCMP

A

Counter Mode/CBC-MAC Protocol (CCMP)
- Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP) is an encryption protocol based on the U.S. federal government’s Advanced Encryption Standard (AES) algorithm and uses the Counter Mode with CBC-MAC (CCM) mode of operation.

20
Q

GCMP

A

Galois/Counter Mode Protocol (GCMP)
- a type of encryption used in the Wireless Protected Access 3 (WPA3) protocol

21
Q

SLA

A

Service Level Agreement (SLA)
- a contract between a service provider and a client that defines the level of service to be provided

22
Q

CVE

A

Common Vulnerabilities and Enumeration (CVE)

23
Q

SLE

A

Single Loss Expectancy (SLE)
- a calculation used in cybersecurity to estimate the monetary loss that could result from a security incident affecting an asset

24
Q

ALE

A

Annualized Loss Expectancy (ALE)
- a metric used to estimate the financial impact of a security incident over a year

25
Q

OVAL

A

Open Vulnerability Assessment Language (OVAL)
- a standard for identifying and communicating security issues on computer systems

26
Q

SOAP

A

Simple Object Access Protocol (SOAP)
- an XML-based messaging protocol used to exchange structured information between web services

27
Q

IdP

A

Identity Provider (IdP)

28
Q

IAM

A

Identity Access Management (IAM)
- a framework of policies, processes, and technologies that help organizations manage digital identities and control user access to critical information

29
Q

NFC

A

Near Field Communication (NFC)

30
Q

BCP

A

Business Continuity Plan (BCP)
- prevention and recovery systems for potential threats, such as natural disasters or cyber-attacks

31
Q

DRP

A

Disaster Recovery Plan (DRP)
- a documented strategy that helps organizations recover from a cyber attack or other incident