Front | Back |
What is SQL?
|
Structured Query Language, used to programmatically interact with relational databases
|
What is XSS?
|
Cross-site scripting, which is used to inject scripts into a web page displayed in a user’s browser
|
What is defense in depth?
|
Multiple layers of security controls, used to discourage or slow down attackers, keeping them from getting to the core of the network
|
What is the OSI model?
|
Seven-layer model describing functions of communications systems
|
What is TCP/IP?
|
A four-layer architecture of communications protocols
|
What is XML external entity injection?
|
Injecting XML into a web request to obtain information or run system programs
|
What is n-tier architecture?
|
Multiple tiers of systems/functions used in application delivery
|
What is a firewall?
|
System or software that allows blocking, rejecting, or allowing network traffic
|
What is AES?
|
Advanced Encryption Standard, the current NIST-approved encryption standard
|
What is a threat?
|
An entity likely to cause damage or loss to an organization
|
What is risk?
|
The measurable potential (probability) for loss or damage
|
What is a subnet mask?
|
A four-octet value indicating which part of an IP address is network and which is host
|
What is CIDR?
|
Classless Inter-Domain Routing. The number of bits covering the network portion of the IP address.
|
What is DNS?
|
Domain Name System, used to resolve hostnames to IP addresses and vice versa, as well as obtain other information associated with a domain
|
What is SIEM?
|
Security information and event management
|