Cybersecurity Course 6 Vocabulary Flashcards

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/76

flashcard set

Earn XP

Description and Tags

A complete set of vocabulary flashcards covering terms and definitions from Cybersecurity Course 6, including incident response, networking, and log analysis.

Last updated 7:16 AM on 5/19/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

77 Terms

1
New cards

Business continuity plan (BCP)

A document that outlines the procedures to sustain business operations during and after a significant disruption

2
New cards

Command-line interface (CLI)

A text-based user interface that uses commands to interact with the computer

3
New cards

Advanced persistent threat (APT)

An instance when a threat actor maintains unauthorized access to a system for an extended period of time

4
New cards

Analysis

The investigation and validation of alerts

5
New cards

Anomaly-based analysis

A detection method that identifies abnormal behavior

6
New cards

Array

A data type that stores data in a comma-separated ordered list

7
New cards

Broken chain of custody

Inconsistencies in the collection and logging of evidence in the chain of custody

8
New cards

Chain of custody

The process of documenting evidence possession and control during an incident lifecycle

9
New cards

Command and control (C2)

The techniques used by malicious actors to maintain communications with compromised systems

10
New cards

Configuration file

A file used to configure the settings of an application

11
New cards

Endpoint detection and response (EDR)

An application that monitors an endpoint for malicious activity

12
New cards

Eradication

The complete removal of the incident elements from all affected systems

13
New cards

Common Event Format (CEF)

A log format that uses key-value pairs to structure data and identify fields and their corresponding values

14
New cards

Computer security incident response teams (CSIRT)

A specialized group of security professionals that are trained in incident management and response

15
New cards

Containment

The act of limiting and preventing additional damage caused by an incident

16
New cards

Crowdsourcing

The practice of gathering information using public collaboration

17
New cards

Data exfiltration

Unauthorized transmission of data from a system

18
New cards

Data packet

A basic unit of information that travels from one device to another within a network

19
New cards

Detection

The prompt discovery of security events

20
New cards

Documentation

Any form of recorded content that is used for a specific purpose

21
New cards

Endpoint

Any device connected on a network

22
New cards

Event

An observable occurrence on a network, system, or device

23
New cards

False negative

A state where the presence of a threat is not detected

24
New cards

False positive

An alert that incorrectly detects the presence of a threat

25
New cards

Final report

Documentation that provides a comprehensive review of an incident

26
New cards

Key-value pair

A set of data that represents 22 linked items: a key, and its corresponding value

27
New cards

Honeypot

A system or resource created as a decoy vulnerable to attacks with the purpose of attracting potential intruders

28
New cards

Host-based intrusion detection system (HIDS)

An application that monitors the activity of the host on which it’s installed

29
New cards

Incident

An occurrence that actually or imminently jeopardizes, without lawful authority, the confidentiality, integrity, or availability of information or an information system; or constitutes a violation or imminent threat of violation of law, security policies, security procedures, or acceptable use policies

30
New cards

Incident handler’s journal

A form of documentation used in incident response

31
New cards

Incident response plan

A document that outlines the procedures to take in each step of incident response

32
New cards

Indicators of attack (IoA)

The series of observed events that indicate a real-time incident

33
New cards

Indicators of compromise (IoC)

Observable evidence that suggests signs of a potential security incident

34
New cards

Internet Protocol (IP)

A set of standards used for routing and addressing data packets as they travel between devices on a network

35
New cards

Intrusion detection system (IDS)

An application that monitors system activity and alerts on possible intrusions

36
New cards

Intrusion prevention system (IPS)

An application that monitors system activity for intrusive activity and takes action to stop the activity

37
New cards

Lessons learned meeting

A meeting that includes all involved parties after a major incident

38
New cards

Log management

The process of collecting, storing, analyzing, and disposing of log data

39
New cards

Network protocol analyzer (packet sniffer)

A tool designed to capture and analyze data traffic within a network

40
New cards

Log analysis

The process of examining logs to identify events of interest

41
New cards

Logging

The recording of events occurring on computer systems and networks

42
New cards

Media Access Control (MAC) Address

A unique alphanumeric identifier that is assigned to each physical device on a network

43
New cards

National Institute of Standards and Technology (NIST) Incident Response Lifecycle

A framework for incident response consisting of 44 phases: Preparation; Detection and Analysis; Containment, Eradication, and Recovery; and Post-incident activity

44
New cards

Network-based intrusion detection system (NIDS)

An application that collects and monitors network traffic and network data

45
New cards

Network data

The data that’s transmitted between devices on a network

46
New cards

Network Interface Card (NIC)

Hardware that connects computers to a network

47
New cards

Network traffic

The amount of data that moves across a network

48
New cards

Object

A data type that stores data in a comma-separated list of key-value pairs

49
New cards

Packet sniffing

The practice of capturing and inspecting data packets across a network

50
New cards

Post-incident activity

The process of reviewing an incident to identify areas for improvement during incident handling

51
New cards

Resilience

The ability to prepare for, respond to, and recover from disruptions

52
New cards

Search Processing Language (SPL)

Splunk’s query language

53
New cards

Security information and event management (SIEM)

An application that collects and analyzes log data to monitor critical activities in an organization

54
New cards

Signature

A pattern that is associated with malicious activity

55
New cards

Open-source intelligence (OSINT)

The collection and analysis of information from publicly available sources to generate usable intelligence

56
New cards

Packet capture (p-cap)

A file containing data packets intercepted from an interface or network

57
New cards

Playbook

A manual that provides details about any operational action

58
New cards

Recovery

The process of returning affected systems back to normal operations

59
New cards

Root user (or superuser)

A user with elevated privileges to modify the system

60
New cards

Security operations center (SOC)

An organizational unit dedicated to monitoring networks, systems, and devices for security threats or attacks

61
New cards

Security orchestration, automation, and response (SOAR)

A collection of applications, tools, and workflows that uses automation to respond to security events

62
New cards

Signature analysis

A detection method used to find events interest

63
New cards

Sudo

A command that temporarily grants elevated permissions to specific users

64
New cards

tcpdump

A command-line network protocol analyzer

65
New cards

Suricata

An open-source intrusion detection system and intrusion prevention system

66
New cards

VirusTotal

A service that allows anyone to analyze suspicious files, domains, URLs, and IP addresses for malicious content

67
New cards

Standards

References that inform how to set policies

68
New cards

Telemetry

The collection and transmission of data for analysis

69
New cards

Threat hunting

The proactive search for threats on a network

70
New cards

Threat intelligence

Evidence-based threat information that provides context about existing or emerging threats

71
New cards

Triage

The prioritizing of incidents according to their level of importance or urgency

72
New cards

True negative

A state where there is no detection of malicious activity

73
New cards

True positive

An alert that correctly detects the presence of an attack

74
New cards

Wildcard

A special character that can be substituted with any other character

75
New cards

Wireshark

An open-source network protocol analyzer

76
New cards

YARA-L

A computer language used to create rules for searching through ingested log data

77
New cards

Zero-day

An exploit that was previously unknown