Acronyms (M-Z) - ECPI Flashcards

1
Q

MAC (Mandatory Access Control)
Purpose?

A

Mandatory Access Control

MAC is a security model that restricts access to resources based on the user’s clearance level.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does MAC stand for in Media Access Control?

A

Media Access Control

MAC is a protocol that governs how data packets are placed on the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does MAC stand for in Message Authentication Code?

A

Message Authentication Code

MAC is used to verify the integrity and authenticity of a message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does MAN stand for?

A

Metropolitan Area Network

MAN is a network that covers a larger geographic area than a local area network (LAN) but smaller than a wide area network (WAN).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does MBR stand for?

A

Master Boot Record

MBR is a special type of boot sector that is used to start the operating system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does MD5 stand for?

A

Message Digest 5

MD5 is a widely used cryptographic hash function that produces a 128-bit hash value.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does MDM stand for?

A

Mobile Device Management

MDM refers to software solutions that allow IT administrators to manage and secure mobile devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does MFA stand for?

A

Multi-Factor Authentication

MFA is a security mechanism that requires multiple forms of verification to access an account.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does MFD stand for?

A

Multi-function Device

MFD refers to a device that can perform multiple functions such as printing, scanning, and copying.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does MITM stand for?

A

Man-in-the-Middle

MITM is a security attack where the attacker secretly relays and possibly alters the communication between two parties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does MMS stand for?

A

Multimedia Message Service

MMS is a standard way to send messages that include multimedia content to and from mobile devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does MOA stand for?

A

Memorandum of Agreement

MOA is a document that outlines the terms and details of an agreement between parties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does MOU stand for?

A

Memorandum of Understanding

MOU is a formal agreement between two or more parties outlining their intentions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does MPLS stand for?

A

Multi-protocol Label Switching

MPLS is a data-carrying technique for high-performance telecommunications networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does MSCHAP stand for?

A

Microsoft Challenge Handshake Authentication Protocol

MSCHAP is a password-based authentication protocol used in Microsoft environments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What does MSP stand for?

A

Managed Service Provider

MSP is a company that remotely manages a customer’s IT infrastructure and end-user systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What does MTBF stand for?

A

Mean Time Between Failures

MTBF is a measure of reliability for repairable items.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What does MTTF stand for?

A

Mean Time to Failure

MTTF is the average time until a non-repairable system fails.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What does MTTR stand for?

A

Mean Time to Recover or Mean Time to Repair

MTTR is the average time taken to repair a system and restore it to operational status.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What does MTU stand for?

A

Maximum Transmission Unit

MTU is the size of the largest packet that can be sent over a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What does NAC stand for?

A

Network Access Control

NAC is a security solution that enforces policies on devices accessing a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What does NAT stand for?

A

Network Address Translation

NAT is a method of remapping an IP address space into another by modifying network address information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What does NDA stand for?

A

Non-disclosure Agreement

NDA is a legally binding contract that establishes a confidential relationship between parties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What does NFC stand for?

A

Near Field Communication

NFC is a set of communication protocols that enable two electronic devices to communicate when they are close to each other.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What does NGAC stand for?

A

Next Generation Access Control

NGAC refers to advanced access control mechanisms that enhance security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What does NIDS stand for?

A

Network-based Intrusion Detection System

NIDS monitors network traffic for suspicious activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What does NIPS stand for?

A

Network-based Intrusion Prevention System

NIPS actively prevents and blocks potential threats in network traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What does NIST stand for?

A

National Institute of Standards & Technology

NIST is a physical sciences laboratory and non-regulatory agency of the U.S. Department of Commerce.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What does NTFS stand for?

A

New Technology File System

NTFS is a file system that the Windows NT operating system uses for storing and retrieving files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What does NTLM stand for?

A

New Technology LAN Manager

NTLM is a suite of Microsoft security protocols that provides authentication, integrity, and confidentiality to users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What does NTP stand for?

A

Network Time Protocol

NTP is a networking protocol for clock synchronization between computer systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What does OAUTH stand for?

A

Open Authorization

OAUTH is an open standard for access delegation commonly used for token-based authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What does OCSP stand for?

A

Online Certificate Status Protocol

OCSP is used for obtaining the revocation status of an X.509 digital certificate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What does OID stand for?

A

Object Identifier

OID is a unique identifier used to name an object in a way that is globally unique.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What does OS stand for?

A

Operating System

OS is system software that manages computer hardware and software resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What does OTA stand for?

A

Over The Air

OTA refers to the wireless delivery of software updates and data to devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What does OVAL stand for?

A

Open Vulnerability Assessment Language

OVAL is an international standard for encoding system security information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What does P12 stand for?

A

PKCS #12

P12 is a binary format for storing a bundle of cryptographic objects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What does P2P stand for?

A

Peer to Peer

P2P is a decentralized communications model in which each party has the same capabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What does PaaS stand for?

A

Platform as a Service

PaaS is a cloud computing model that provides a platform allowing customers to develop, run, and manage applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What does PAC stand for?

A

Proxy Auto Configuration

PAC is a file that defines how web browsers can automatically select the appropriate proxy server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

What does PAM stand for?

A

Pluggable Authentication Modules

PAM is a framework for integrating multiple authentication methods into applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What does PAP stand for?

A

Password Authentication Protocol

PAP is a simple authentication protocol used to validate users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

What does PAT stand for?

A

Port Address Translation

PAT is a type of network address translation that allows multiple devices on a local network to be mapped to a single public IP address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

What does PBKDF2 stand for?

A

Password-based Key Derivation Function 2

PBKDF2 is a key derivation function that is used to derive one or more secret keys from a password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

What does PBX stand for?

A

Private Branch Exchange

PBX is a private telephone network used within an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

What does PCAP stand for?

A

Packet Capture

PCAP is a file format used to capture network packets for analysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

What does PEAP stand for?

A

Protected Extensible Authentication Protocol

PEAP is a method to securely transmit authentication information over a wireless network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

What does PED stand for?

A

Personal Electronic Device

PED refers to any electronic device that is used by an individual for personal purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

What does PEM stand for?

A

Privacy-enhanced Electronic Mail

PEM is a standard for securing email messages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

What does PFS stand for?

A

Perfect Forward Secrecy

PFS is a property of secure communication protocols that ensures session keys are not compromised even if the private key is compromised.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

What does PFX stand for?

A

Personal Exchange Format

PFX is a file format that is used to store a certificate and its private key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

What does PGP stand for?

A

Pretty Good Privacy

PGP is an encryption program that provides cryptographic privacy and authentication for data communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

What does PHI stand for?

A

Personal Health Information

PHI refers to any information that can be used to identify a patient and relates to their health status.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

What does PII stand for?

A

Personally Identifiable Information

PII is any data that could potentially identify a specific individual.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

What does PIV stand for?

A

Personal Identity Verification

PIV is a standard for secure and reliable identification of individuals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

What does PKI stand for?

A

Public Key Infrastructure

PKI is a framework for managing digital certificates and public-key encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

What does POODLE stand for?

A

Padding Oracle on Downgrade Legacy Encryption

POODLE is a security vulnerability that affects SSL 3.0.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

What does POP stand for?

A

Post Office Protocol

POP is a protocol used by email clients to retrieve emails from a server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

What does POTS stand for?

A

Plain Old Telephone Service

POTS refers to the traditional analog telephone service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

What does PPP stand for?

A

Point-to-Point Protocol

PPP is a data link protocol commonly used to establish a direct connection between two networking nodes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

What does PPTP stand for?

A

Point-to-Point Tunneling Protocol

PPTP is a method for implementing virtual private networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

What does PSK stand for?

A

Pre-shared Key

PSK is a shared secret used for authentication in wireless networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

What does PTZ stand for?

A

Pan-Tilt-Zoom

PTZ refers to cameras that can move in multiple directions and zoom in/out.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

What does RA stand for?

A

Recovery Agent

RA is an entity that manages the recovery of encrypted data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

What does RA stand for in Registration Authority?

A

Registration Authority

RA is an entity that verifies the identity of users requesting digital certificates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

What does RAD stand for?

A

Rapid Application Development

RAD is a software development methodology that emphasizes quick development and iteration.

69
Q

What does RADIUS stand for?

A

Remote Authentication Dial-in User Server

RADIUS is a networking protocol that provides centralized Authentication, Authorization, and Accounting management.

70
Q

What does RAID stand for?

A

Redundant Array of Inexpensive Disks

RAID is a data storage virtualization technology that combines multiple physical disk drive components.

71
Q

What does RAS stand for?

A

Remote Access Server

RAS is a server that allows remote users to connect to a network.

72
Q

What does RAT stand for?

A

Remote Access Trojan

RAT is a type of malware that allows unauthorized remote access to a user’s computer.

73
Q

What does RBAC stand for?

A

Role-based Access Control

RBAC is a method of regulating access to computer or network resources based on the roles of individual users.

74
Q

What does RBAC stand for in Rule-based Access Control?

A

Rule-based Access Control

RBAC is a method of access control that uses rules to determine access permissions.

75
Q

What does RC4 stand for?

A

Rivest Cipher version 4

RC4 is a stream cipher that is used in various encryption protocols.

76
Q

What does RDP stand for?

A

Remote Desktop Protocol

RDP is a protocol that allows users to connect to another computer over a network.

77
Q

What does RFID stand for?

A

Radio Frequency Identifier

RFID uses electromagnetic fields to automatically identify and track tags attached to objects.

78
Q

What does RIPEMD stand for?

A

RACE Integrity Primitives Evaluation Message Digest

RIPEMD is a family of cryptographic hash functions.

79
Q

What does ROI stand for?

A

Return on Investment

ROI is a performance measure used to evaluate the efficiency of an investment.

80
Q

What does RMF stand for?

A

Risk Management Framework

RMF is a structured process that integrates risk management activities into the system development life cycle.

81
Q

What does RPO stand for?

A

Recovery Point Objective

RPO is the maximum acceptable amount of data loss measured in time.

82
Q

What does RSA stand for?

A

Rivest, Shamir, & Adleman

RSA is a public-key cryptosystem used for secure data transmission.

83
Q

What does RTBH stand for?

A

Remotely Triggered Black Hole

RTBH is a method used to mitigate DDoS attacks by dropping malicious traffic.

84
Q

What does RTO stand for?

A

Recovery Time Objective

RTO is the maximum acceptable amount of time to restore a system after a failure.

85
Q

What does RTOS stand for?

A

Real-time Operating System

RTOS is an operating system intended to serve real-time applications that process data as it comes in.

86
Q

What does RTP stand for?

A

Real-time Transport Protocol

RTP is a network protocol for delivering audio and video over IP networks.

87
Q

What does S/MIME stand for?

A

Secure/Multipurpose Internet Mail Extensions

S/MIME is a standard for public key encryption and signing of MIME data.

88
Q

What does SaaS stand for?

A

Software as a Service

SaaS is a software distribution model in which applications are hosted by a service provider and made available to customers over the internet.

89
Q

What does SAML stand for?

A

Security Assertions Markup Language

SAML is an open standard for exchanging authentication and authorization data between parties.

90
Q

What does SAN stand for?

A

Storage Area Network

SAN is a dedicated network that provides access to consolidated, block-level data storage.

91
Q

What does SAN stand for in Subject Alternative Name?

A

Subject Alternative Name

SAN is an extension to the X.509 specification that allows users to specify additional host names for a single SSL certificate.

92
Q

What does SCADA stand for?

A

System Control and Data Acquisition

SCADA is a system used to monitor and control industrial processes.

93
Q

What does SCAP stand for?

A

Security Content Automation Protocol

SCAP is a suite of specifications that standardizes the format and nomenclature of security-related information.

94
Q

What does SCEP stand for?

A

Simple Certificate Enrollment Protocol

SCEP is a protocol used for the secure distribution of digital certificates.

95
Q

What does SCP stand for?

A

Secure Copy

SCP is a means of securely transferring files between a local host and a remote host.

96
Q

What does SCSI stand for?

A

Small Computer System Interface

SCSI is a set of standards for connecting and transferring data between computers and peripheral devices.

97
Q

What does SDK stand for?

A

Software Development Kit

SDK is a collection of software development tools in one installable package.

98
Q

What does SDLC stand for?

A

Software Development Life Cycle

SDLC is a process for planning, creating, testing, and deploying software.

99
Q

What does SDLM stand for?

A

Software Development Life Cycle Methodology

SDLM refers to the various methodologies used to manage software development projects.

100
Q

What does SDN stand for?

A

Software Defined Network

SDN is an approach to networking that uses software-based controllers to manage network resources.

101
Q

What does SED stand for?

A

Self-encrypting Drive

SED is a hard drive that automatically encrypts data written to it.

102
Q

What does SEH stand for?

A

Structured Exception Handler

SEH is a mechanism in Windows operating systems for handling exceptions.

103
Q

What does SFTP stand for?

A

Secured File Transfer Protocol

SFTP is a secure version of the File Transfer Protocol (FTP) that uses SSH to encrypt data.

104
Q

What does SHA stand for?

A

Secure Hashing Algorithm

SHA is a family of cryptographic hash functions designed by the National Security Agency.

105
Q

What does SHTTP stand for?

A

Secure Hypertext Transfer Protocol

SHTTP is a protocol for transmitting encrypted data over the web.

106
Q

What does SIEM stand for?

A

Security Information and Event Management

SIEM is a solution that aggregates and analyzes security data from across an organization.

107
Q

What does SIM stand for?

A

Subscriber Identity Module

SIM is a card inserted into mobile devices that contains the International Mobile Subscriber Identity (IMSI).

108
Q

What does SLA stand for?

A

Service Level Agreement

SLA is a contract that defines the level of service expected from a service provider.

109
Q

What does SLE stand for?

A

Single Loss Expectancy

SLE is the expected monetary loss every time a risk occurs.

110
Q

What does SMB stand for?

A

Server Message Block

SMB is a network file sharing protocol that allows applications to read and write to files and request services from server programs.

111
Q

What does SMS stand for?

A

Short Message Service

SMS is a text messaging service component of most telephone, internet, and mobile device systems.

112
Q

What does SMTP stand for?

A

Simple Mail Transfer Protocol

SMTP is a protocol for sending email messages between servers.

113
Q

What does SMTPS stand for?

A

Simple Mail Transfer Protocol Secure

SMTPS is an extension of SMTP that adds support for the Transport Layer Security (TLS) protocol.

114
Q

What does SNMP stand for?

A

Simple Network Management Protocol

SNMP is a protocol used for network management and monitoring.

115
Q

What does SOAP stand for?

A

Simple Object Access Protocol

SOAP is a protocol for exchanging structured information in web services.

116
Q

What does SoC stand for?

A

System on Chip

SoC is an integrated circuit that integrates all components of a computer or other electronic system.

117
Q

What does SPF stand for?

A

Sender Policy Framework

SPF is an email validation system designed to prevent spam by verifying sender IP addresses.

118
Q

What does SPIM stand for?

A

Spam over Internet Messaging

SPIM refers to unsolicited messages sent over instant messaging systems.

119
Q

What does SPoF stand for?

A

Single Point of Failure

SPoF is a part of a system that, if it fails, will stop the entire system from working.

120
Q

What does SQL stand for?

A

Structured Query Language

SQL is a standardized programming language used to manage relational databases.

121
Q

What does SRTP stand for?

A

Secure Real-Time Protocol

SRTP provides encryption, message authentication, and integrity, and replay protection to the RTP data in streaming media.

122
Q

What does SSD stand for?

A

Solid State Drive

SSD is a type of storage device that uses flash memory to store data.

123
Q

What does SSH stand for?

A

Secure Shell

SSH is a cryptographic network protocol for operating network services securely over an unsecured network.

124
Q

What does SSID stand for?

A

Service Set Identifier

SSID is a name that identifies a wireless network.

125
Q

What does SSL stand for?

A

Secure Sockets Layer

SSL is a standard security technology for establishing an encrypted link between a server and a client.

126
Q

What does SSO stand for?

A

Single Sign-on

SSO is an authentication process that allows a user to access multiple applications with one set of login credentials.

127
Q

What does STP stand for?

A

Shielded Twisted Pair

STP is a type of cable that protects against electromagnetic interference.

128
Q

What does TACACS+ stand for?

A

Terminal Access Controller Access Control System Plus

TACACS+ is a protocol that provides centralized authentication for users who access network services.

129
Q

What does TCP/IP stand for?

A

Transmission Control Protocol/Internet Protocol

TCP/IP is a set of communication protocols used for the internet and similar networks.

130
Q

What does TGT stand for?

A

Ticket Granting Ticket

TGT is a special type of ticket used in Kerberos authentication.

131
Q

What does TKIP stand for?

A

Temporal Key Integrity Protocol

TKIP is a security protocol used in wireless networks to provide encryption.

132
Q

What does TLS stand for?

A

Transport Layer Security

TLS is a cryptographic protocol designed to provide secure communication over a computer network.

133
Q

What does TOTP stand for?

A

Time-based One-time Password

TOTP is an algorithm that computes a one-time password from a shared secret and the current time.

134
Q

What does TPM stand for?

A

Trusted Platform Module

TPM is a hardware-based security feature that provides secure generation and storage of cryptographic keys.

135
Q

What does TSIG stand for?

A

Transaction Signature

TSIG is a security protocol used to provide authentication for DNS messages.

136
Q

What does UAT stand for?

A

User Acceptance Testing

UAT is the process of verifying that a solution works for the user.

137
Q

What does UAV stand for?

A

Unmanned Aerial Vehicle

UAV refers to an aircraft that operates without a human pilot on board.

138
Q

What does UDP stand for?

A

User Datagram Protocol

UDP is a communication protocol used across the internet for especially time-sensitive transmissions.

139
Q

What does UEFI stand for?

A

Unified Extensible Firmware Interface

UEFI is a modern firmware interface for computers, designed to replace the traditional BIOS.

140
Q

What does UPS stand for?

A

Uninterruptable Power Supply

UPS is a device that provides backup power when the electrical supply fails.

141
Q

What does URI stand for?

A

Uniform Resource Identifier

URI is a string of characters that uniquely identifies a particular resource.

142
Q

What does URL stand for?

A

Universal Resource Locator

URL is the address used to access resources on the internet.

143
Q

What does USB stand for?

A

Universal Serial Bus

USB is a standard for connecting computers and electronic devices.

144
Q

What does USB OTG stand for?

A

USB On The Go

USB OTG is a specification that allows USB devices to act as a host.

145
Q

What does UTM stand for?

A

Unified Threat Management

UTM is a comprehensive security solution that combines multiple security features into a single device.

146
Q

What does UTP stand for?

A

Unshielded Twisted Pair

UTP is a type of cable used in computer networking and telecommunications.

147
Q

What does VDE stand for?

A

Virtual Desktop Environment

VDE is a technology that allows users to access a desktop environment from any device.

148
Q

What does VDI stand for?

A

Virtual Desktop Infrastructure

VDI is a technology that hosts a desktop operating system on a centralized server.

149
Q

What does VLAN stand for?

A

Virtual Local Area Network

VLAN is a logical subnetwork that groups together a collection of devices from different physical LANs.

150
Q

What does VLSM stand for?

A

Variable Length Subnet Masking

VLSM allows for the creation of subnets of different sizes, optimizing IP address usage.

151
Q

What does VM stand for?

A

Virtual Machine

VM is a software emulation of a physical computer that runs an operating system and applications.

152
Q

What does VoIP stand for?

A

Voice over IP

VoIP is a technology that allows voice communication and multimedia sessions over the internet.

153
Q

What does VPN stand for?

A

Virtual Private Network

VPN is a service that creates a secure connection over a less secure network.

154
Q

What does VTC stand for?

A

Video Teleconferencing

VTC is a technology that allows two or more locations to communicate via two-way video and audio transmissions.

155
Q

What does WAF stand for?

A

Web Application Firewall

WAF is a security system that monitors and filters HTTP traffic to and from a web application.

156
Q

What does WAP stand for?

A

Wireless Access Point

WAP is a device that allows wireless devices to connect to a wired network using Wi-Fi.

157
Q

What does WEP stand for?

A

Wired Equivalent Privacy

WEP is a security protocol that was designed to provide a wireless local area network with a level of security and privacy.

158
Q

What does WIDS stand for?

A

Wireless Intrusion Detection System

WIDS is a system that monitors a wireless network for unauthorized access.

159
Q

What does WIPS stand for?

A

Wireless Intrusion Prevention System

WIPS is a system that detects and prevents unauthorized access to a wireless network.

160
Q

What does WORM stand for?

A

Write Once Read Many

WORM refers to storage media that can be written once and read many times.

161
Q

What does WPA stand for?

A

WiFi Protected Access

WPA is a security protocol designed to create secure wireless networks.

162
Q

What does WPA2 stand for?

A

WiFi Protected Access 2

WPA2 is an updated version of WPA that provides stronger security.

163
Q

What does WPS stand for?

A

WiFi Protected Setup

WPS is a network security standard that allows users to easily secure a wireless home network.

164
Q

What does WTLS stand for?

A

Wireless TLS

WTLS is a security protocol for wireless communication.

165
Q

What does XML stand for?

A

Extensible Markup Language

XML is a markup language that defines a set of rules for encoding documents in a format that is both human-readable and machine-readable.

166
Q

What does XOR stand for?

A

Exclusive Or

XOR is a logical operation that outputs true only when the inputs differ.

167
Q

What does XSRF stand for?

A

Cross-site Request Forgery

XSRF is an attack that tricks the victim into submitting a request that they did not intend.

168
Q

What does XSS stand for?

A

Cross-site Scripting

XSS is a security vulnerability that allows attackers to inject malicious scripts into content from otherwise trusted websites.