Terms C Flashcards

1
Q

Categorize

A

The second step of the NIST RMF that is used to develop risk management processes and tasks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

CentOS

A

An open-source distribution that is closely related to Red Hat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Central Processing Unit (CPU)

A

A computer’s main processor, which is used to perform general computing tasks on a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Chain of custody

A

The process of documenting evidence possession and control during an incident lifecycle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Chronicle

A

A cloud-native tool designed to retain, analyze, and search data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Cipher

A

An algorithm that encrypts information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Cloud-based firewalls

A

Software firewalls that are hosted by the cloud service provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Cloud computing

A

The practice of using remote servers, applications, and network services that are hosted on the internet instead of on local physical devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Cloud network

A

A collection of servers or computers that stores resources and data in remote data centers that can be accessed via the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Cloud Security

A

The process of ensuring that assets stored in the cloud are properly configured and access to those assets is limited to authorized users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Command

A

An instruction telling the computer to do something

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Command and control (C2)

A

The techniques used by malicious actors to maintain communications with compromised systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Command-line interface (CLI)

A

A text-based user interface that uses commands to interact with the computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Comment

A

A note programmers make about the intention behind their code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Common Event Format (CEF)

A

A log format that uses key-value pairs to structure data and identify fields and their corresponding values

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Common Vulnerabilities and Exposures (CVE®) list

A

An openly accessible dictionary
of known vulnerabilities and exposures

17
Q

Common Vulnerability Scoring System (CVSS)

A

A measurement system that scores
the severity of a vulnerability

18
Q

Compliance

A

Compliance: The process of adhering to internal standards and external regulations

19
Q

Computer Security Incident Response Teams (CSIRT)

A

A specialized group of security professionals that are trained in incident management and response

20
Q

Computer virus

A

Malicious code written to interfere with computer operations and cause damage to data and software

21
Q

Conditional statement

A

A statement that evaluates code to determine if it meets a specified set of conditions

22
Q

Confidentiality

A

The idea that only authorized users can access specific assets or data

23
Q

Confidential data

A

Data that often has limits on the number of people who have
access to it

24
Q

Configuration file

A

A file used to configure the settings of an application

24
Q

Confidentiality, integrity, availability (CIA) triad

A

A model that helps inform how
organizations consider risk when setting up systems and security policies

25
Q

Containment

A

The act of limiting and preventing additional damage caused by an
incident

26
Q

Controlled zone

A

A subnet that protects the internal network from the uncontrolled
zone

27
Q

Crowdsourcing

A

The practice of gathering information using public input and collaboration

28
Q

Cross-site scripting (XSS)

A

An injection attack that inserts code into a vulnerable website or web application

29
Q

Cryptographic attack

A

An attack that affects secure forms of communication between a sender and intended recipient

30
Q

Cryptographic key

A

A mechanism that decrypts ciphertext

31
Q

Cryptography

A

The process of transforming information into a form that unintended readers can’t understand

32
Q

CVE Numbering Authority (CNA)

A

An organization that volunteers to analyze and distribute information on eligible CVEs

33
Q

Cryptojacking

A

A form of malware that installs software to illegally mine cryptocurrencies

34
Q

Cybersecurity (or security)

A

The practice of ensuring confidentiality, integrity, and availability of information by protecting networks, devices, people, and data from unauthorized access or criminal exploitation