Security X Flashcards

(135 cards)

1
Q

ABAC

A

Attribute-Based Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ACL

A

Access Control List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ACME

A

Automated Certificate Management Environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

AEAD

A

Authenticated Encryption with Associated Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

AI

A

Artificial Intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

API

A

Application Programming Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

APT

A

Advanced Persistent Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

AQL

A

Ariel Query Language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

ATT&CK

A

MITRE Adversarial Tactics Techniques and Common Knowledge framework

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Ansible

A

Open source automation tool used to automate IT tasks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

BCP

A

Business Continuity Plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

BEAST

A

Browser Exploit Against SSL TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

BIA

A

Business Impact Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

BIOS

A

Basic Input Output System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

BYOD

A

Bring Your Own Device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

C2

A

Command and Control infrastructure used by attackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

CA

A

Certificate Authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

CAPEC

A

Common Attack Pattern Enumeration and Classification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

CASB

A

Cloud Access Security Broker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

CBC

A

Cipher Block Chaining

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

CC

A

Common Criteria

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

CCPA

A

California Consumer Privacy Act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

CDN

A

Content Delivery Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

CI/CD

A

Continuous Integration Continuous Deployment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
CIS
Center for Internet Security
26
CMDB
Configuration Management Database
27
CNAME
Canonical Name DNS record
28
COBIT
Control Objectives for Information and Related Technologies
29
COPPA
Children's Online Privacy Protection Act
30
COSO
Committee of Sponsoring Organizations governance framework
31
CPE
Common Platform Enumeration
32
CPU
Central Processing Unit
33
CRL
Certificate Revocation List
34
CSR
Certificate Signing Request
35
CVE
Common Vulnerabilities and Exposures
36
CVSS
Common Vulnerability Scoring System
37
CWPP
Cloud Workload Protection Platform
38
DAC
Discretionary Access Control
39
DAST
Dynamic Application Security Testing
40
DDoS
Distributed Denial of Service
41
DHCP
Dynamic Host Configuration Protocol
42
DKIM
DomainKeys Identified Mail
43
DLP
Data Loss Prevention
44
DMARC
Domain based Message Authentication Reporting and Conformance
45
DNS
Domain Name System
46
DNSSEC
Domain Name System Security Extensions
47
DoS
Denial of Service
48
EAP
Extensible Authentication Protocol
49
ECC
Elliptic Curve Cryptography
50
EDR
Endpoint Detection and Response
51
EMI
Electromagnetic Interference
52
EMP
Electromagnetic Pulse
53
EOL
End of Life
54
FAST
Flexible Authentication via Secure Tunneling
55
FDE
Full Disk Encryption
56
FIDO
Fast Identity Online
57
GDPR
General Data Protection Regulation
58
GPO
Group Policy Object
59
GRC
Governance Risk and Compliance
60
HIDS
Host based Intrusion Detection System
61
HIPS
Host based Intrusion Prevention System
62
HKLM
HKEY_LOCAL_MACHINE registry hive
63
HSM
Hardware Security Module
64
HSTS
HTTP Strict Transport Security
65
HTTP
Hypertext Transfer Protocol
66
HTTPS
Hypertext Transfer Protocol Secure
67
IAM
Identity and Access Management
68
IDS
Intrusion Detection System
69
IPS
Intrusion Prevention System
70
IoC
Indicator of Compromise
71
IoT
Internet of Things
72
IRP
Incident Response Plan
73
JSON
JavaScript Object Notation
74
LAN
Local Area Network
75
LDAP
Lightweight Directory Access Protocol
76
MAC
Mandatory Access Control
77
MDM
Mobile Device Management
78
MFA
Multi Factor Authentication
79
MX
Mail Exchange DNS record
80
NAC
Network Access Control
81
NIDS
Network Intrusion Detection System
82
NIPS
Network Intrusion Prevention System
83
NIST
National Institute of Standards and Technology
84
NTLM
New Technology LAN Manager authentication protocol
85
OAuth
Open Authorization
86
OCSP
Online Certificate Status Protocol
87
OS
Operating System
88
OSINT
Open Source Intelligence
89
OTP
One Time Password
90
OWASP
Open Web Application Security Project
91
PAM
Privileged Access Management
92
PCI DSS
Payment Card Industry Data Security Standard
93
PII
Personally Identifiable Information
94
PKI
Public Key Infrastructure
95
RBAC
Role Based Access Control
96
RCE
Remote Code Execution
97
RDP
Remote Desktop Protocol
98
RPO
Recovery Point Objective
99
RSA
Rivest Shamir Adleman encryption algorithm
100
RTO
Recovery Time Objective
101
SAML
Security Assertion Markup Language
102
SASE
Secure Access Service Edge
103
SAST
Static Application Security Testing
104
SBOM
Software Bill of Materials
105
SCA
Software Composition Analysis
106
SCADA
Supervisory Control and Data Acquisition
107
SDN
Software Defined Networking
108
SIEM
Security Information and Event Management
109
SOAR
Security Orchestration Automation and Response
110
SOC
Security Operations Center
111
SPF
Sender Policy Framework
112
SSH
Secure Shell
113
SSL
Secure Sockets Layer
114
SSO
Single Sign On
115
TLS
Transport Layer Security
116
TPM
Trusted Platform Module
117
TTPs
Tactics Techniques and Procedures
118
UDP
User Datagram Protocol
119
UEBA
User and Entity Behavior Analytics
120
UEFI
Unified Extensible Firmware Interface
121
USB
Universal Serial Bus
122
VLAN
Virtual Local Area Network
123
VPN
Virtual Private Network
124
WAF
Web Application Firewall
125
WLAN
Wireless Local Area Network
126
XDR
Extended Detection and Response
127
XML
Extensible Markup Language
128
XSS
Cross Site Scripting
129
YAML
YAML Ain't Markup Language
130
YARA
Yet Another Recursive Acronym malware detection rules
131
Linting
Code linting is the process of automatically checking code for errors and stylistic issues. It’s performed using a lint tool, also known as a linter.
132
NGFW
Next Gen Firewall
133
GCM
Galois Counter Mode
134
SAN
Subject Alternate Name
135
RASP
RASP (Runtime Application Self-Protection) is a security technology that is integrated into an application to detect and prevent real-time threats while the application is running.