Polishing

0.0(0)
studied byStudied by 0 people
full-widthCall with Kai
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/57

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

58 Terms

1
New cards

Mutation Testing

Introduces small code changes to test defenses; “break code on purpose”; static vs dynamic distinction.

2
New cards

Code Auditing

Manual review of code without executing it; “read-only inspection for errors.”

3
New cards

Event

Neutral observation in a system; could be anything; “just a logged action.”

4
New cards

Incident

An event causing negative impact requiring response; “employee using outdated privileges without malicious intent.”

5
New cards

Intrusion

Confirmed violation of CIA; malicious intent or compromise; “someone breaking into your house.”

6
New cards

Whitelisting

Only approved apps allowed; “VIP list; deny all else.”

7
New cards

Blacklisting

Block known bad; “banned list.”

8
New cards

Graylisting

Temporarily delay until verified; “probationary access.”

9
New cards

Bluelisting

Trust based on a community set; “club membership for trusted apps.”

10
New cards

Public Cloud

Open to anyone; multi-tenant; “hotel room anyone can book.”

11
New cards

Private Cloud

Exclusive to one org; “personal mansion.”

12
New cards

Community Cloud

Shared by orgs with common goals; “government consortium.”

13
New cards

Hybrid/Shared Cloud

Combination of cloud types; “timeshare style mix.”

14
New cards

RAID 0

Striping, fast, no redundancy; “all offense, no backup players.”

15
New cards

RAID 1

Mirroring; redundant; “two identical teams.”

16
New cards

RAID 5

Striping + parity; 1 disk tolerance; “backup notes for each play.”

17
New cards

RAID 6

Double parity; 2 disk tolerance; “double backup.”

18
New cards

RAID 10

Mirror of stripes; combination of performance + redundancy; “combo team.”

19
New cards

AES

Symmetric, 128/192/256-bit; “modern vault.”

20
New cards

DES

Symmetric, 56-bit; outdated; “rusty padlock.”

21
New cards

3DES

Symmetric, 112–168-bit; legacy; “reinforced old vault.”

22
New cards

RSA

Asymmetric, 1024–4096+ bits; “mailbox key.”

23
New cards

ECC

Asymmetric, strong per-bit efficiency; “compact smart lock.”

24
New cards

ISO Standards

International standards framework. “Global rulebook” – recognized internationally. Often referenced for organizational compliance and policy frameworks.

25
New cards

NIST Publications

US-specific technical guidance (SP 800 series). “Government playbook” – 800-series documents. Used for best practices, risk assessment, and security controls guidance.   

26
New cards

Zzuf

Fuzzing tool for testing software with unexpected input. “Throw spaghetti at the code” – detects buffer overflows. Focus on software security testing and vulnerability discovery.

27
New cards

Nessus

Vulnerability scanner for networks. “Security checklist scanner” – scans for system vulnerabilities. Often used in questions about network security audits or compliance checks.

28
New cards

Audit Logs

Records user/system activity (auth, file access). “Security diary” – tracks user actions. Look for tracking user behavior, auditing policy enforcement.

29
New cards

Trace Logs

Detailed sequence of program/system calls. “Black box flight recorder” – execution path tracking. Useful for incident investigation or debugging software/system behavior.

30
New cards

Qualitative Risk Analysis

Uses subjective scoring to assess risk (High/Medium/Low). “Risk feels” – no numeric calculations. Compare to quantitative for scenario questions: non-numeric, prioritization-based decisions.

31
New cards

RFC 1918 – 172.16.0.0/12

Private IPv4 address range. “Neighborhood block” – for internal network use. Used to identify internal vs external IPs; may appear in NAT/VLAN scenarios.

32
New cards

RFC 1918 – 192.168.0.0/16

Private IPv4 address range. “Apartment building” – for internal network use. Commonly used in home/small-office network examples.

33
New cards

Testimonial Evidence

Witness statements used in legal proceedings. “Eyewitness story” – relies on memory. Often compared with hearsay or real evidence in forensic questions.

34
New cards

Hearsay Rule

Second-hand statements usually inadmissible. “He said, she said” – not original evidence. Know distinction for chain-of-custody and evidence reliability.

35
New cards

Real Evidence

Physical objects used as evidence. “Weapon, hard drive” – tangible items. High reliability; often contrasted with testimonial evidence.

36
New cards

Parol Evidence Rule

Oral statements cannot override written contracts. “Words don’t beat the contract” – written contract supersedes oral statements. Appears in legal/regulatory scenario questions on agreements.

37
New cards

Workflow-based Provisioning

Account creation requires approval chain. “Follow the steps” – admin-controlled workflow. Compare to automated/self-service; often in identity management scenarios.

38
New cards

Automated Provisioning

Scripts or tools automatically create accounts. “Robot creates the access” – system-driven process. Fast deployment, may reduce errors but requires monitoring.

39
New cards

Discretionary Provisioning

Admin decides access individually. “Manager approval” – admin choice. Flexibility vs consistency tradeoff; often contrasted with automated/self-service.

40
New cards

Wave Pattern Detector

Detects movement using sound waves (ultrasonic/microwave). “Ultrasonic motion sensor” – motion-based detection. Frequently tested in physical security/IDS questions.

41
New cards

Capacitance Detector

Detects changes in an electrical field. “Touch-sensor motion” – electrical disturbance triggers alarm. Used in access detection, often indoors.

42
New cards

Heat-based Detector

Detects changes in temperature (body or fire). “Thermal motion sensor” – heat/thermal detection. Common in fire safety or intrusion detection scenarios.

43
New cards

Infrared Detector

Detects infrared radiation from objects. “Night vision beam” – IR-based motion. Often contrasted with wave pattern or heat detectors.

44
New cards

Application Logs

Records application-level events. “App diary” – software actions. Look for questions on app-level auditing or incident troubleshooting. 

45
New cards

Web Server Logs

Tracks HTTP requests and responses. “Web guestbook” – HTTP events. Often used in forensic or intrusion analysis scenarios.

46
New cards

System Logs

Records OS/system-level events. “Operating system diary” – kernel, auth events. Key for system auditing and incident investigations.

47
New cards

Facility Codes (Syslog)

Identifies the source of the log (kernel, mail, auth, etc.). “Who wrote the diary” – source of log entries. Often appears in questions involving log filtering or prioritization.

48
New cards

NAT

Translates private IP addresses to public and vice versa. “Translator for IP addresses” – internal external mapping. Appears in network architecture questions or firewall/NAT scenarios.

49
New cards

VLAN

Creates virtual segments within a network. “Virtual partition of network” – logical network segmentation. Used to separate traffic and enhance security.

50
New cards

Static Packet Filtering Firewall

Examines packet headers only; basic control. “Guard at the door” – layer 3–4 inspection. Compare to stateful or application-level firewalls; simple allow/deny rules.

51
New cards

Circuit-level Gateway

Monitors TCP handshakes for session validity. “Traffic cop” – session-level firewall. Often tested for session-based inspection vs packet header inspection.

52
New cards

Stateful Inspection Firewall

Tracks sessions and context to allow/deny traffic. “Memory-aware guard” – tracks stateful sessions. Know differences from static packet filtering and application-level gateway.

53
New cards

CBC (DES mode)

Each block depends on previous; chained encryption. “Paper chain” – sequential dependency. Understand block chaining, error propagation, and when it’s used vs ECB.

54
New cards

CFB / OFB (DES modes)

Converts block cipher to stream cipher. “Stream-like encryption” – stream-mode operation. Look for questions on converting block ciphers to stream for bit-level encryption.

55
New cards

Registration

Creates credentials/accounts after proofing. “Boarding pass issuance” – follows identity proofing. Appears in identity management scenario questions; distinguish from proofing.

56
New cards

Shortcut Trust

Trust between child domains in same forest. “Hallway shortcut” – single-forest link. Compare with forest/external/realm trust; affects authentication paths.

57
New cards

External Trust

Trust between separate organizational domains. “International border” – cross-organization domain link. Often tested in cross-domain authentication scenarios.

58
New cards

Realm Trust

Trust between Kerberos and AD realm. “Passport control” – cross-authentication realm. Appears in hybrid environments or mixed Kerberos/AD questions.