Vocab Flashcards

1
Q

Tokenization

A

Process of turning a meaningful piece of data into a token that has no meaningful value if breached

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Iaas (Infrastructure as a service)

A

Cloud computing that provides virtualized resources over the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

PaaS (Platform as a service)

A

Third party provider delivers hardware and software tools over the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

SaaS (Software as a service)

A

Cloud provider hosts applications and makes them available over the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Thin Client

A

A computer that runs from resources stored on a central server instead of a hard drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Elasticity

A

Ability of an IT infrastructure to respond without jeopardizing availability, security, and performance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Scalability

A

Ability of a process, network, or software to grow and manage demand

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Key Strectching

A

Converting a password to a longer and more random key for cryptographic purposes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Elliptic-Curve Cryptography

A

Public key encryption technique that creates faster, smaller, and more efficient keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Perfect Forward Secrcey

A

Encryption system that changes the keys to encrypt and decrypt frequently and automatically

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

DNNSSEC (Domain name system security extension)

A

Defend against techniques hackers use to direct computers to rogue websites and servers using SSH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

S/MIME (Secure multipurpose internet mail extension)

A

Sending digitally signed and encrypted messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

SRTP (secure real-time protocol)

A

Uses encryption and authentication to minimize risk of DOS attacks and breaches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

LADPS (lightweight directory access protocol over SSL)

A

Authenticate users from windows server and active directory over SSL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

FTPS (File transfer protocol secure)

A

Secure file transfer protocol that allows businesses to connect securely with customers, users etc using TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SFTP (Secure file transfer protocol over SSH)

A

Secure file transfer protocol that runs over the SSH protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

SNMPv3 (simple network management protocol v3)

A

Provides security with authentication and privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

IPSec (internet protocol security)

A

Suit of protocols developed to ensure integrity, confidentiality, and authentication of data over the IP network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

SQL (structured query language)

A

Standard database language which is used to create, maintain and retrieve the relational database

20
Q

Directory Traversal

A

Web security vulnerability that allows an attacker to read arbitrary files on the server that is running an application

21
Q

Memory Leak

A

A program you run, fails to release memory that it has used

22
Q

Integer Overflow

A

An arrhythmic error when the result of an integer operation does not fit within the allocated memory

23
Q

Error Handling

A

Response and recovery procedures from error conditions present in a software application

24
Q

Improper Input Handling

A

Term used to describe functions such as validation, sanitization, filter erroring, encoding and decoding of data

25
Q

DLL (dynamic link library)

A

A library that can be shared by several applications running under windows

26
Q

LDAP (lightweight directory access protocol)

A

Software protocol for enabling anyone to locate data about organizations, individuals, and other resources

27
Q

XML (Extensive markup language)

A

Designed to store and transport data and designed to be readable by humans and machines

28
Q

Buffer Overflow

A

Writing data to a buffer, overruns the buffers boundaries and overwrites adjacent memory locations

29
Q

Replay Attack

A

Network attack which a valid data transmission is maliciously or fraudulently repeated or delayed

30
Q

Pass the hash

A

Attacker captures a password hash and the passes it through for authentication and lateral movement

31
Q

Evil Twin

A

Fake wifi network that steals data

32
Q

Rogue Access point

A

Wireless access point that has been installed on a network

33
Q

Bluesnarfing

A

Hacking a device using bluetooth

34
Q

Bluejacking

A

Sending anonymous messages to Bluetooth devices

35
Q

ARP Poisoning (address resolution protocol poisoning)

A

Attack carried out over the LAN that sends ARP packets to a default gateway in order to change the IP to MAC address table

36
Q

MAC Flooding

A

Compromising the security of switches

37
Q

DNS Highjacking

A

Changing the registration of a domain name without permission

38
Q

DNS Poisoning

A

Altered DNS records are used to redirect online traffic to a fraudulent website that resembles the intended target

39
Q

False-Positive

A

Mislabeled security alters, indicating there is a threat when there isn’t

40
Q

False-Negatives

A

A security system fails to identify a threat. Produces a negative result when there is a problem.

41
Q

OSINT (open-source intelligence)

A

Framework focused on gathering information from free tools and resources

42
Q

Masking

A

Method of creating structurally similar but inauthentic version of an organizations data

43
Q

Data at rest

A

Data that is not actively moving from device to device or network to network such as data stored don a hard drive, laptop, floppy disks etc

44
Q

Data in motion/transit

A

Digital information that is in the process of being transported between location either within or between computer systems

45
Q

Data in processing

A

Conversion of raw data to meaningful information through a process