Acronym N-T Flashcards

1
Q

NAC

A

Network Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

NAT

A

Network Access Translation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

NDA

A

Non-Disclosure Agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

NFC

A

Near Field Communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

NGFW

A

Next Generation Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

NIDS

A

Network Based Intrusion Detection System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

NIPS

A

Network based Intrusion Prevention System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

NIST

A

National Institute of Standards and Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

NTFS

A

New Technology File System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

NTLM

A

New technology Lan Manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

NTP

A

Network Time Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

OAUTH

A

Open Authorisation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

OCSP

A

Online Certificate Status Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

OID

A

Object Identifier

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

OS

A

Operating System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

OSINT

A

Open Source Intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

OSPF

A

Open shortest Path First

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

OT

A

Operational Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

OTA

A

Over the Air

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

OVAL

A

Open Vulnerability Assessment Language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

P12

A

PKCS 12

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

P2P

A

Peer to Peer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

PaaS

A

Platform as a Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

PAC

A

Proxy Auto Configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
PAM
Privilege Access Management Pluggable Authentication Modules
26
PAP
Password Authentication Protocol
27
PAT
Port Address Translation
28
PBKDF2
Password Based Key derivation function 2
29
PBX
Private Branch Exchange
30
PCAP
Packet Capture
31
PCI DSS
Payment Card Industry Data Security Standard
32
PDU
Power Distribution Unit
33
PEAP
Protected Extensible Authentication Protocol
34
PED
Personal Electronic Device
35
PEM
Privacy Enhanced Mail
36
PFS
Perfect Forward Secrecy
37
PGP
Pretty Good Privacy
38
PHI
Personal Health Information
39
PII
Personally Identifiable Information
40
PIV
Personal Identity Verification
41
PKCS
Public Key Cryptography standards
42
PKI
Public key Infrastructure
43
PoP
Post Office Protocol
44
POTS
Plain Old Television Service
45
ppp
Point to Point Protocol
46
PPTP
Point to Point tunnelling Protocol
47
PSK
Preshared Key
48
PTZ
Pan Tilt Zoom
49
PUP
Potentially Unwanted Programme
50
RA
Recovery Agent Registration Authority
51
RACE
Research and Development in Advanced Communications Technologies in Europe
52
RAD
Radical Application Development
53
RaDIUS
Remote Authentication Dial in user Service
54
Raid
Redundant array of inexpensive disks
55
RAS
Remote Access Server
56
RAT
Remote Access Trojan
57
RBAC
Role based Access Control Rule based access control
58
RC4
Rivest Cipher Version 4
59
RDP
Remote Desktop Protocol
60
RFID
Radio Frequency Identifier
61
RIPEMD
RACE - Integrity Primitives Evaluation message digest
62
ROI
Return on Investment
63
RPO
Recovery Point Objective
64
RSA
Rivest Shamir and Adleman
65
RTBH
Remotely Triggered Black Hole
66
RTO
Recovery Time Objective
67
RTOS
Real time operating system
68
RTP
Real-time Transport Protocol
69
S/MINE
Secure/Multipurpose Internet Mail Extensions
70
SaaS
Software as a service
71
SAE
Simultaneous Authentication of Equals
72
SAML
Security Assertions Markup Languages
73
SAN
Storage Access Network Subject Alternative Name
74
SASE
Secure Access Service Edge
75
SCADA
Supervisory Control and Data Acquisition
76
SCAP
Security Content Automation Protocol
77
SCEP
Security Certificate Enrolment Protocol
78
SD-WAN
Software defined Wide Area Network
79
SDK
Software Development Kit
80
SDLC
Software Development Lifecycle
81
SDLM
Software Development Lifecycle Methodology
82
SDN
Software-defined Networking
83
SE Linux
Security-enhanced Linux
84
SED
Self-encrypting Drives
85
SEH
Structured Exception Handler
86
SFTP
Secured File Transfer Protocol
87
SHA
Secure Hashing Algorithm
88
SHTTP
Secure Hypertext Transfer Protocol
89
SIEM
Security Information and Event Management
90
SIM
Subscriber Identity Module
91
SLA
Service-level Agreement
92
SLE
Single Loss Expectancy
93
SMS
Short Message Service
94
SMTP
Simple Mail Transfer Protocol
95
SMTPS
Simple Mail Transfer Protocol Secure
96
SNMP
Simple Network Management Protocol
97
SOAP
Simple Object Access Protocol
98
SOAR
Security Orchestration, Automation, Response
99
SoC
System on Chip
100
SOC
Security Operations Center
101
SOW
Statement of Work
102
SPF
Sender Policy Framework
103
SPIM
Spam over Internet Messaging
104
SQL
Structured Query Language
105
SQLi
SQL Injection
106
SRTP
Secure Real-Time Protocol
107
SSD
Solid State Drive
108
SSH
Secure Shell
109
SSL
Secure Sockets Layer
110
SSO
Single Sign-On
111
STIX
Structured Threat Information eXchange
112
SWG
Secure Web Gateway
113
TACACS+
Terminal Access Controller Access Control System
114
TAXII
Trusted Automated eXchange of Indicator Information
115
TCP/IP
Transmission Control Protocol/Internet Protocol
116
TKIP
Temporal Key Integrity Protocol
117
TGT
Ticket grant ticket
118
TLS
Transport Layer Security
119
TOC
Time-of-Check
120
TOTP
Time-based one time password
121
TOU
Time of Use
122
TPM
Trusted Platform Module
123
TTP
Tactics, Techniques, and Procedures
124
TSIG
Transaction Signature