Acronyms & Definitions Flashcards

1
Q

(ISC)2

A

International Information Systems Security Certification Consortium

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

API

A

Application Programming Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ASCII

A

American Standard Code for Information Interchange

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

BGP

A

Broader Gateway Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

CIDR

A

Classless interdomain Routing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

CMMI

A

Capability Maturity Model Integration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

COM

A

Component Object Model

A model that allows for interprocess communication within one application or between applications on the same computer system.

Harris, Shon (2013-09-16). CISSP Boxed Set, Second Edition (All-in-One) (Kindle Locations 23418-23419). McGraw-Hill Education. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

CORBA

A

Commn Object Request
Broker Architecture

An open object- oriented standard architecture developed by the Object Management Group (OMG). It provides interoperability among the vast array of software, platforms, and hardware in environments today. CORBA enables applications to communicate with one another no matter where the applications are located or who developed them.

Harris, Shon (2013-09-16). CISSP Boxed Set, Second Edition (All-in-One) (Kindle Locations 23387-23389). McGraw-Hill Education. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

CRC

A

Cyclic Redundancy Checking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

DCOM

A

Distributed Component Object Model

Supports the same model for component interaction, and also supports distributed interprocess communication (IPC).

DCOM enables applications to access objects that reside in different parts of a network.

So this is how the client/ server-based activities are carried out by COM-based operating systems and/ or applications.

Harris, Shon (2013-09-16). CISSP Boxed Set, Second Edition (All-in-One) (Kindle Locations 23422-23423). McGraw-Hill Education. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

EAP-TLS

A

Extensible Authentication Protocol-Transport Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

FDDI

A

Fiber Distributed Data Interface (FDDI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

FTP

A

File Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

GIF

A

Graphic interchange Format

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

HDLC

A

High-Level Data Link Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

HTTP

A

Hypertext Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

ICANN

A

Internet Corporation for Assigned Names and Numbers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

ICMP

A

Internet Control Message Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

IDS

A

Intrusion Detection Services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

IGMP

A

Internet Group Management Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

IPS

A

Intrusion Prevention Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

IPSec

A

Internet Protocol Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

J2EE

A

Java Platform, Enterprise Edition

J2EE is an enterprise Java computing platform. This means it is a framework that is used to develop enterprise software written mainly in the Java programming language. It provides APIs for networking services, fault tolerance, security, and web services for large-scale, multi-tiered network applications.

Harris, Shon (2013-09-16). CISSP Boxed Set, Second Edition (All-in-One) (Kindle Location 23456). McGraw-Hill Education. Kindle Edition.

24
Q

JPEG

A

Joint Photographic Experts Group Format

25
L2TP
Layer 2 Tunneling Protocol
26
LLC
Logical Link Control
27
LPD
Line Printer Protocol
28
MAC
Media Access Control
29
MACSec
Media Access Control Security Standard
30
MPTD
Maximum Period Time of Disruption
31
MTD
Maximum Tolerable Downtime
32
MTU
Maximum Transmission Unit
33
NAT
Network Address Translation
34
**NIC**
**Network Interface Card**
35
**OLE**
**Object Linking and Embedding** ## Footnote Provides a way for objects to be shared on a local personal computer and to use COM as their foundation. OLE enables objects— such as graphics, clipart, and spreadsheets— to be embedded into documents. The capability for one program to call another program is called ***linking.*** The capability to place a piece of data inside a foreign program or document is called ***embedding.*** Harris, Shon (2013-09-16). CISSP Boxed Set, Second Edition (All-in-One) (Kindle Locations 23444-23446). McGraw-Hill Education. Kindle Edition. Harris, Shon (2013-09-16). CISSP Boxed Set, Second Edition (All-in-One) (Kindle Locations 23443-23444). McGraw-Hill Education. Kindle Edition.
36
**ORB**
**Object Request Broker** ## Footnote The ORB manages all communications between components and enables them to interact in a heterogeneous and distributed environment. The ORB works independently of the platforms where the objects reside, which provides greater interoperability. *Harris, Shon (2013-09-16). CISSP Boxed Set, Second Edition (All-in-One) (Kindle Locations 23399-23400). McGraw-Hill Education. Kindle Edition.*
37
OSPF
Open Shortest Path First
38
PPP
Point-to-Point Protocol
39
QoS
Quality of Service
40
RADIUS
Remote Authentication Dial-In User Server
41
RIP
Routing Information Protocol
42
RPC
Remote Procedure Call
43
RPO
Recovery Point Objective
44
RTO
Recovery Time Objective
45
SMTP
Simple Mail Transfer Protocol
46
SPX
Sequenced Packet Exchange
47
SQL
Structured Query Language
48
SSL
Secure Sockets Layer
49
STP
Shielded Twisted Pair
50
TFTP
Trivia File Transfer Protocol
51
TIFF
Tagged Image File Format
52
ToS
Type of Service
53
TTL
Time to Live
54
UTP
Unshielded Twisted Pair
55
UTP
Unshield Twisted Pair
56
VPN
Virtual Private Network
57
WRT
Work Recovery Time