Terms Flashcards

Learn Terminology

1
Q

What is ARO

A

Annualized Rate of Occurrence, estimate how often a threat or risk is likely to occur

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is ALE

A

Annual Lose Expectancy, average and estimated loss rate of devices to things like stolen property

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is COPE

A

Company Owned Personally Enabled, When the company provides a Mobile device to an employee and can be used also as a personal device as well.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is CRL

A

Certificate Revocation List, a list of public key certificates that have been revoked

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what is CYOD

A

Choose Your Own Device, Hardware management model in cybersecurity that allows employees to select a pre-approved device from a company-provided list

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

who is the Data Owner

A

The Person who owns the data in question

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

who is the Data Controller

A

determines the purposes and means of processing personal data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

who is the data steward

A

define, implement, and enforce data management policies and procedures within their specific Data Domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

who is the Data Processor

A

holds personal data on behalf of the data controller

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what is DLP

A

Data Loss Prevention, the practice of preventing data breaches, exfiltration or unwanted destruction of sensitive Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is EAP

A

Extensible Authentication Protocol, used to authenticate information between Workstation and Authentication Server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a Federation based sign on

A

Variant of Single Sign On (SSO) that allows sign in without password. Uses trust between two well know servers/systems to authenticate the user who has already signed it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what is HIPS

A

Host Intrusion Prevention system, this party software on the Host Machine to identify and prevent Malicious activities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is an HSM

A

Hardware Security Modules, Hardened tamper resistant hardware devices, by managing keys used for encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a Logic Bomb

A

Type of malicious code embedded in software that remains dormant until specific conditions are met

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what is MTTR

A

Mean Time to Repair, Time it would take to be able to repair equipment that breaks

17
Q

what is OCSP

A

Online Certificate Status Protocol, Alt to Certificate Revocation List (CRL) used to check whether Cert is valid or revoked.

18
Q

What is OCSP Stalping

A

an internet standard that allows us to check the validity status of X. 509 digital certificates.

19
Q

what is a On-Path Attack

A

place themselves between two devices (often a web browser and a web server) and intercept or modify communications between the two

20
Q

what is a Policy Engine

A

A software component that evaluates and enforces rules or policies within an organization or application

21
Q

what is a Policy Enforcment Point

A

protects objects, such as files, services, and applications, and enforces authorization decisions

22
Q

what is a PSK

A

Pre-Shared Key, security mechanism used in Wi-Fi Protected Access (WPA) to establish a secure connection between a wireless device and a Wi-Fi access point

23
Q

what is a Race Condition

A

software bug that can occur in a computing system when multiple operations need to be executed in a specific order, but the system doesn’t enforce that order

24
Q

what is a Responsibility Matrix

A

define and manage roles and responsibilities for tasks, milestones, and decisions

25
Q

what is a Replay Attack

A

type of network attack where a cybercriminal intercepts and retransmits network communication between two parties

26
Q

What is a SASE

A

Secure access service edge, framework for network architecture that brings cloud native security technologies

27
Q

what is a supply chain attack

A

targets an organization’s suppliers or third-party vendors to gain unauthorized access to their systems or data

28
Q

what is a Secure Enclave

A

hardware-based component of a computing device that provides an extra layer of security to protect data

29
Q

what is a SCAP

A

Security Content Automation Protocol, set of standards and protocols that help organizations improve their cybersecurity

30
Q

what is a WAF

A

Web Application Firewall, Firewall that is web based for web servers and applications

31
Q

what is a UTM

A

Unified Threat Management, when multiple security features or services are combined into a single device within your network

32
Q

what is a Zeon Configuration

A

logical design approaches that control and limit access and data communication to certain users and components

33
Q

what is 802.1X

A

LDAP Protocol method to use Local AD user credentials to authenticate to the WPA2-3 Wi-Fi connections within a Wi-Fi Network.