CORRECT Answers
DKIM
3DES
ACL
AES
API
ARP
APT
ATT&CK
AUP
BEC
BYOD
CA
CAN
CASB
CI/CD
CIS
COBIT
Information
CPU
CRM
CVSS
DDoS
DGA
DHCP
, lgorithmAccess Control List
T
Advanced Encryption Standard
r
Application Programming Interface
i
Address Resolution Protocol
p
Advanced Persistent Threat
l
Adversarial Tactics, Techniques, and Common Knowledge
e
Acceptable Use Policy
Business Email Compromise
D
Bring Your Own Device
a
Certificate Authority
t
Controller Area Network
a
Cloud Access Security Broker
Continuous Integration/Continuous Delivery
E
Center for Internet Security
n
Control Objectives for
c
and Related Technology
r
Central Processing Unit
y
Customer Relations Management
p
Common Vulnerability Scoring System
t
Distributed Denial of Service
i
Domain Generation Algorithm
o
Dynamic Host Configuration Protocol
n
Domain Keys Identified Mail
A
2/5