Terms A Flashcards

1
Q

Absolute file path

A

The full file path, which starts from the root

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Access controls

A

Security controls that manage access, authorization, and
accountability of information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Active packet sniffing

A

A type of attack where data packets are manipulated in transit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Address Resolution Protocol (ARP)

A

A network protocol used to determine the MAC
address of the next router or device on the path

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Advanced persistent threat (APT)

A

An instance when a threat actor maintains
unauthorized access to a system for an extended period of time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Adversarial artificial intelligence (AI):

A

A technique that manipulates artificial
intelligence (AI) and machine learning (ML) technology to conduct attacks more
efficiently

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Adware

A

A type of legitimate software that is sometimes used to display digital
advertisements in applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Algorithm

A

A set of rules used to solve a problem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Analysis

A

The investigation and validation of alerts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Angler phishing

A

A technique where attackers impersonate customer service
representatives on social media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Anomaly-based analysis

A

A detection method that identifies abnormal behavior

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Antivirus software

A

A software program used to prevent, detect, and eliminate
malware and viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Application

A

A program that performs a specific task

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Application programming interface (API) token

A

A small block of encrypted code
that contains information about a user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Argument (Linux)

A

Specific information needed by a command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Argument (Python)

A

The data brought into a function when it is called

17
Q

Array

A

A data type that stores data in a comma-separated ordered list

18
Q

Assess

A

The fifth step of the NIST RMF that means to determine if established controls
are implemented correctly

19
Q

Asset

A

An item perceived as having value to an organization

20
Q

Asset classification

A

The practice of labeling assets based on sensitivity and
importance to an organization

21
Q

Asset inventory

A

A catalog of assets that need to be protected

22
Q

Asset management

A

The process of tracking assets and the risks that affect them

23
Q

Asymmetric encryption

A

The use of a public and private key pair for encryption and
decryption of data

24
Q

Attack surface

A

All the potential vulnerabilities that a threat actor could exploit

25
Q

Attack tree

A

A diagram that maps threats to assets

26
Q

Attack vectors

A

The pathways attackers use to penetrate security defenses

27
Q

Authentication

A

The process of verifying who someone is

28
Q

Authorization

A

The concept of granting access to specific resources in a system

29
Q

Authorize

A

The sixth step of the NIST RMF that refers to being accountable for the
security and privacy risks that might exist in an organization

30
Q

Automation

A

The use of technology to reduce human and manual effort to perform
common and repetitive tasks

31
Q

Availability

A

The idea that data is accessible to those who are authorized to access it