• Barajar
    Activar
    Desactivar
  • Alphabetizar
    Activar
    Desactivar
  • Frente Primero
    Activar
    Desactivar
  • Ambos lados
    Activar
    Desactivar
  • Leer
    Activar
    Desactivar
Leyendo...
Frente

Cómo estudiar sus tarjetas

Teclas de Derecha/Izquierda: Navegar entre tarjetas.tecla derechatecla izquierda

Teclas Arriba/Abajo: Colvea la carta entre frente y dorso.tecla abajotecla arriba

Tecla H: Muestra pista (3er lado).tecla h

Tecla N: Lea el texto en voz.tecla n

image

Boton play

image

Boton play

image

Progreso

1/81

Click para voltear

81 Cartas en este set

  • Frente
  • Atrás
ACL
Access Control List
ADFS
Active Directory Federation Services
AP
Access Point
API
Application Programming Interface
APNS
Apple Push NotificationService
APT
Advanced Persistent Threat
ASLR
Address Space Layout Randomization
BPA
Business Partnership Agreement
CA
Certificate Authority
CAPEC
Common Atacks Patterns Enumeration Classification
CERT
Computer Emergency Response Team
CGI
Common Gateway Interface
CIFS
Common Internet File System
CIRT
Computer Incident Response Team
CORS
Cross-Origin Request Scripting
COTS
Commercial Off-The-Shell
CRL
Cerficate Revocation List
CSRF
Cross-Site Request Forgery
CVE
Common Vulnerability EXposures
CVSS
Common Vulnerability Scorring System
CWE
Common Weaknees Enumeration
DAST
Dynamic Application Security Testing
DCOM
Distributed Component Object Model
DFD
Data Flow Diagram
DLL
Dynamic Link Library
DNS
Domain Name Service
DOM
Document Object Model
DoS
Denail of Services
DTP
Dynamic Trunking Protocol
ECDSA
Elliptic Curve Digital Signature Algorithm
EULA
End User Lincense Agreement
FTP
File Transfer Protocol
GPO
Group Policy Object
GPP
Generic Packetized Protocol
GRE
Generic Routing Encapsulation
HSTS
HTTP Strict Trasport Security
HTML
HyperText Markup Language
I/O
Input/Output
ICMP
Internet Control Message Protocol
ICS
Industrial Control Systems
IDOR
Indirect Object Reference
IoT
Internet of things
IPS
Intrusion Prevention System
IV
Initialization Vector
JPCERT
Japan Computer Emergency Response Team
JTAG
Join Test Action Group
LAPS
Local Administrator Password Solution
LFI
Local File Inclusion
LLMNR
Link-Local Multicast Name Resolution
LSASS
Local Security Authority Sybsystem Service
MDM
Mobile Divece Management
MFA
Multifactor Authentication
MITM
Man-in-the-Middle
MSA
Master Service Agreement
NAC
Network Access Control
NBNS
Net Bios Name Service
NDA
Non-Disclosure Agreement
NFC
Near-Field Communication
NIST
National Institute of Standards and Technology
NOP
No Operation
NSE
Network Service Engine
OS
Operation System
OSINT
Open Source Intelligence
OWASP
Open Web Application Security Project
PII
Personally Identifiable Information
POS
Point Of Sale
PS
PowerShell
RCE
Remote Code Execution
RDP
Remote Desktop Protocole
RFI
Remote File Inclusion
RFID
Radio Frequent ID
RFP
Request for Proposal
ROE
Rules of Engagement
RPC
remote Procedure Call
RSH
Remote Shell
RTOS
Real Time Operation System
SAM
Security Account Manager
SAN
Subject Alternative Name
SAST
Static Application Security Testing
SCADA
Supervisory Control and Data Acquisition
SCEP
Simple Certificate Enroolment Protocol