Cisco CyberOps Associate (CBROPS 200-201) – Core Vocabulary

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/102

flashcard set

Earn XP

Description and Tags

Comprehensive vocabulary flashcards covering foundational terms, technologies, and concepts likely to appear on the Cisco CyberOps Associate (CBROPS 200-201) exam.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

103 Terms

1
New cards

CIA Triad

Foundational security model consisting of Confidentiality, Integrity, and Availability.

2
New cards

Confidentiality

Assurance that information is accessible only to authorized users.

3
New cards

Integrity

Assurance that data is accurate and has not been tampered with.

4
New cards

Availability

Assurance that systems and data are accessible to authorized users when needed.

5
New cards

Risk

The potential for loss or damage when a threat exploits a vulnerability.

6
New cards

Threat

Any circumstance or event with the potential to harm an asset.

7
New cards

Vulnerability

A weakness that can be exploited by a threat actor.

8
New cards

Exploit

A technique or code that takes advantage of a vulnerability.

9
New cards

Defense-in-Depth

Layered security strategy that deploys multiple, complementary controls.

10
New cards

Discretionary Access Control (DAC)

Access model where data owners decide who may access their resources.

11
New cards

Mandatory Access Control (MAC)

Access model enforcing system-wide rules set by a central authority.

12
New cards

Role-Based Access Control (RBAC)

Model granting permissions based on a user’s job role.

13
New cards

Attribute-Based Access Control (ABAC)

Model using attributes (user, resource, environment) to make access decisions.

14
New cards

Time-Based Access Control

Permissions granted or denied based on temporal conditions.

15
New cards

AAA (Authentication, Authorization, Accounting)

Framework controlling user identity, access privileges, and activity logging.

16
New cards

CVSS

Common Vulnerability Scoring System used to rate severity of security flaws.

17
New cards

Attack Vector (CVSS)

How an attacker can exploit a vulnerability (network, adjacent, local, physical).

18
New cards

Attack Complexity (CVSS)

Conditions beyond attacker control that must exist for exploitation.

19
New cards

Privileges Required (CVSS)

Level of access required by an attacker to exploit a vulnerability.

20
New cards

User Interaction (CVSS)

Whether exploitation requires action by a user other than the attacker.

21
New cards

Scope (CVSS)

Whether a successful exploit can affect resources beyond the vulnerable component.

22
New cards

Temporal Metrics (CVSS)

Scores that change over time, such as exploit code maturity.

23
New cards

Environmental Metrics (CVSS)

Organization-specific factors influencing vulnerability severity.

24
New cards

5-Tuple

Network identification set: source IP, destination IP, source port, destination port, protocol.

25
New cards

Rule-Based Detection

Security monitoring using predefined signatures or rules.

26
New cards

Behavioral Detection

Monitoring that identifies anomalies relative to a baseline of normal activity.

27
New cards

Statistical Detection

Use of statistics to determine deviations indicating potential threats.

28
New cards

SIEM

Security Information and Event Management platform aggregating and analyzing logs.

29
New cards

SOAR

Security Orchestration, Automation, and Response platform automating incident workflows.

30
New cards

Log Management

Collection, storage, and analysis of log data for security and compliance.

31
New cards

Agentless Protection

Security monitoring performed without installing software on endpoints.

32
New cards

Agent-Based Protection

Security monitoring that relies on software agents installed on devices.

33
New cards

Threat Intelligence (TI)

Information about adversaries, TTPs, and indicators to inform defense.

34
New cards

Threat Hunting

Proactive search for hidden threats in an environment.

35
New cards

Malware Analysis

Process of studying malicious code to understand capabilities and indicators.

36
New cards

Reverse Engineering

Analyzing software to determine its design and functionality from compiled code.

37
New cards

Sliding Window Anomaly Detection

Technique that examines a moving window of data to detect anomalies.

38
New cards

DevSecOps

Integration of security practices into DevOps workflows.

39
New cards

TCPdump

Command-line packet capture tool for network traffic analysis.

40
New cards

NetFlow

Cisco protocol that summarizes IP traffic flows for monitoring and analysis.

41
New cards

Next-Generation Firewall (NGFW)

Firewall combining traditional filtering with application awareness and threat prevention.

42
New cards

Stateful Firewall

Firewall tracking active connections to make filtering decisions.

43
New cards

Application Visibility and Control (AVC)

Technology classifying and managing application traffic.

44
New cards

Web Content Filtering

Control that blocks or allows web requests based on policies.

45
New cards

Email Content Filtering

Scanning and policy enforcement for inbound and outbound email.

46
New cards

Access Control List (ACL)

Ordered set of permit/deny rules applied to interfaces or services.

47
New cards

NAT/PAT

Network Address Translation / Port Address Translation for IP address sharing.

48
New cards

TOR

Anonymizing network that routes traffic through volunteer relays.

49
New cards

Tunneling

Encapsulating one protocol within another to traverse a network.

50
New cards

Full Packet Capture

Recording of every packet’s payload and header for analysis.

51
New cards

Session Data

Summarized record of communication sessions (e.g., flow records).

52
New cards

Transaction Data

Details about application-layer requests and responses.

53
New cards

Statistical Data

Aggregated metrics such as counts, averages, or variances.

54
New cards

Metadata

Information describing data attributes, not the content itself.

55
New cards

Alert Data

Generated notifications indicating potential security events.

56
New cards

Protocol-Based Attack

Exploitation targeting flaws in network protocol implementations.

57
New cards

Denial of Service (DoS)

Attack aimed at making a service unavailable to users.

58
New cards

Distributed DoS (DDoS)

Coordinated DoS launched from multiple systems.

59
New cards

Man-in-the-Middle (MitM)

Attack where adversary intercepts and alters communications between parties.

60
New cards

SQL Injection

Web attack injecting malicious SQL statements into input fields.

61
New cards

Command Injection

Web attack forcing execution of arbitrary commands on a host OS.

62
New cards

Cross-Site Scripting (XSS)

Injecting malicious scripts into webpages viewed by other users.

63
New cards

Social Engineering

Manipulating people to divulge confidential information or perform actions.

64
New cards

Command and Control (C2)

Channel attackers use to remotely control compromised systems.

65
New cards

Ransomware

Malware encrypting data and demanding payment for decryption.

66
New cards

Evasion Technique

Method used by attackers to avoid detection (e.g., encryption, proxies).

67
New cards

PKI

Public Key Infrastructure managing digital certificates and key pairs.

68
New cards

X.509 Certificate

Standard format for public key certificates used in TLS/SSL.

69
New cards

Cipher Suite

Set of algorithms used to secure a TLS/SSL session.

70
New cards

Key Exchange

Process in which parties establish a shared secret for encryption.

71
New cards

Host-Based Intrusion Detection System (HIDS)

Monitors endpoint activities for signs of malicious behavior.

72
New cards

Antimalware / Antivirus

Software detecting and removing malicious code on hosts.

73
New cards

Host-Based Firewall

Firewall running directly on an endpoint to control inbound/outbound traffic.

74
New cards

Chain of Custody

Documentation that tracks evidence handling to preserve integrity.

75
New cards

Indicator of Compromise (IOC)

Observable artifact signifying a potential intrusion (hash, IP, domain).

76
New cards

Indicator of Attack (IOA)

Evidence of malicious intent or behavior preceding a compromise.

77
New cards

Best Evidence

Most reliable information directly proving a fact in an investigation.

78
New cards

Corroborative Evidence

Data supporting findings by providing additional validation.

79
New cards

Indirect Evidence

Information suggesting but not directly proving a fact.

80
New cards

PCAP

File format containing captured packet data.

81
New cards

IDS/IPS

Intrusion Detection/Prevention Systems monitoring traffic for malicious activity.

82
New cards

False Positive

Benign activity incorrectly identified as malicious.

83
New cards

False Negative

Malicious activity that goes undetected by security tools.

84
New cards

True Positive

Correctly detected malicious activity.

85
New cards

True Negative

Correctly identified benign activity.

86
New cards

Deep Packet Inspection (DPI)

Analysis of packet payloads and headers for advanced filtering.

87
New cards

Traffic Tap

Passive device duplicating network traffic for monitoring.

88
New cards

Regular Expression

Pattern-matching syntax used for searching and parsing text.

89
New cards

Asset Management

Process of inventorying and tracking organizational resources.

90
New cards

Patch Management

Regular deployment of updates to fix vulnerabilities.

91
New cards

NIST SP 800-61

Guideline for computer security incident handling.

92
New cards

Incident Response Phases

Preparation, Detection & Analysis, Containment & Eradication & Recovery, Post-Incident.

93
New cards

NIST SP 800-86

Guide to integrating forensic techniques into incident response.

94
New cards

Evidence Collection Order

Priority sequence for gathering data, typically volatile first.

95
New cards

Data Preservation

Maintaining evidence in an unaltered state for legal admissibility.

96
New cards

Network Profiling

Establishing baselines for throughput, session duration, ports, and asset space.

97
New cards

Server Profiling

Baseline of listening ports, users, processes, tasks, and applications on servers.

98
New cards

PII

Personally Identifiable Information requiring protection (e.g., SSN, name, DOB).

99
New cards

PHI

Protected Health Information regulated under HIPAA.

100
New cards

Intellectual Property (IP)

Proprietary knowledge or creations that grant competitive advantage.