Acronyms Flashcards

Abreviations

1
Q

CAPTCHA

A
  • user ID mechanism that is used to thwart automated software log ins such as network bots
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

AES

A

current best encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

DES

A

former encryption stnadard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

SDLC

A

create and maintain apps (Software Development Life Cycle)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

UEFI

A

firmware interface that replaced BiOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

UTM

A

network security solution that provides a single point of protection against various threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

WAP

A

Wireless Access Point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

HTML

A

Hyper Text Markup Language (creating and organizing web content

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Http

A

Hyper Text transfer protocol
(network protocol enables retrieving contents of an Internet page from a web server)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

PCI DSS

A

Secures credit cards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

SLE

A

preicted loss of value to an asset based on single security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

BPA

A
  • normal contract between business partners outlining the rights, responsibilities, and obligations of each partner regarding the management, operation, and decision-making processes within the business
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

IDS vs. IPS

A

llustrates the difference between passive and active network security breach response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

MAC

A

SELinux kernel security feature for implementing stricter access controls and policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ReBAC

A

access control model allows for defining granular rules that consider user roles, time constraints, and network access restrictions?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

LDAP

A

Lightweight Directory Access protocol

17
Q

SMTP

A

Sending Email from mail server snf from a client device

18
Q

SED

A

refers to a data storage device equipped with hardware-level encryption functionality

19
Q

SSH

A

type of cryptographic network protocol for secure data communication, remote command-line login, remote command execution, and other secure network services between two networked