Acronyms (M-Z) - ECPI Flashcards

(168 cards)

1
Q

MAC (Mandatory Access Control)
Purpose?

A

Mandatory Access Control

MAC is a security model that restricts access to resources based on the user’s clearance level.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does MAC stand for in Media Access Control?

A

Media Access Control

MAC is a protocol that governs how data packets are placed on the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does MAC stand for in Message Authentication Code?

A

Message Authentication Code

MAC is used to verify the integrity and authenticity of a message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does MAN stand for?

A

Metropolitan Area Network

MAN is a network that covers a larger geographic area than a local area network (LAN) but smaller than a wide area network (WAN).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does MBR stand for?

A

Master Boot Record

MBR is a special type of boot sector that is used to start the operating system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does MD5 stand for?

A

Message Digest 5

MD5 is a widely used cryptographic hash function that produces a 128-bit hash value.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does MDM stand for?

A

Mobile Device Management

MDM refers to software solutions that allow IT administrators to manage and secure mobile devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does MFA stand for?

A

Multi-Factor Authentication

MFA is a security mechanism that requires multiple forms of verification to access an account.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does MFD stand for?

A

Multi-function Device

MFD refers to a device that can perform multiple functions such as printing, scanning, and copying.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does MITM stand for?

A

Man-in-the-Middle

MITM is a security attack where the attacker secretly relays and possibly alters the communication between two parties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does MMS stand for?

A

Multimedia Message Service

MMS is a standard way to send messages that include multimedia content to and from mobile devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does MOA stand for?

A

Memorandum of Agreement

MOA is a document that outlines the terms and details of an agreement between parties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does MOU stand for?

A

Memorandum of Understanding

MOU is a formal agreement between two or more parties outlining their intentions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does MPLS stand for?

A

Multi-protocol Label Switching

MPLS is a data-carrying technique for high-performance telecommunications networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does MSCHAP stand for?

A

Microsoft Challenge Handshake Authentication Protocol

MSCHAP is a password-based authentication protocol used in Microsoft environments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What does MSP stand for?

A

Managed Service Provider

MSP is a company that remotely manages a customer’s IT infrastructure and end-user systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What does MTBF stand for?

A

Mean Time Between Failures

MTBF is a measure of reliability for repairable items.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What does MTTF stand for?

A

Mean Time to Failure

MTTF is the average time until a non-repairable system fails.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What does MTTR stand for?

A

Mean Time to Recover or Mean Time to Repair

MTTR is the average time taken to repair a system and restore it to operational status.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What does MTU stand for?

A

Maximum Transmission Unit

MTU is the size of the largest packet that can be sent over a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What does NAC stand for?

A

Network Access Control

NAC is a security solution that enforces policies on devices accessing a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What does NAT stand for?

A

Network Address Translation

NAT is a method of remapping an IP address space into another by modifying network address information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What does NDA stand for?

A

Non-disclosure Agreement

NDA is a legally binding contract that establishes a confidential relationship between parties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What does NFC stand for?
Near Field Communication ## Footnote NFC is a set of communication protocols that enable two electronic devices to communicate when they are close to each other.
26
What does NGAC stand for?
Next Generation Access Control ## Footnote NGAC refers to advanced access control mechanisms that enhance security.
27
What does NIDS stand for?
Network-based Intrusion Detection System ## Footnote NIDS monitors network traffic for suspicious activity.
28
What does NIPS stand for?
Network-based Intrusion Prevention System ## Footnote NIPS actively prevents and blocks potential threats in network traffic.
29
What does NIST stand for?
National Institute of Standards & Technology ## Footnote NIST is a physical sciences laboratory and non-regulatory agency of the U.S. Department of Commerce.
30
What does NTFS stand for?
New Technology File System ## Footnote NTFS is a file system that the Windows NT operating system uses for storing and retrieving files.
31
What does NTLM stand for?
New Technology LAN Manager ## Footnote NTLM is a suite of Microsoft security protocols that provides authentication, integrity, and confidentiality to users.
32
What does NTP stand for?
Network Time Protocol ## Footnote NTP is a networking protocol for clock synchronization between computer systems.
33
What does OAUTH stand for?
Open Authorization ## Footnote OAUTH is an open standard for access delegation commonly used for token-based authentication.
34
What does OCSP stand for?
Online Certificate Status Protocol ## Footnote OCSP is used for obtaining the revocation status of an X.509 digital certificate.
35
What does OID stand for?
Object Identifier ## Footnote OID is a unique identifier used to name an object in a way that is globally unique.
36
What does OS stand for?
Operating System ## Footnote OS is system software that manages computer hardware and software resources.
37
What does OTA stand for?
Over The Air ## Footnote OTA refers to the wireless delivery of software updates and data to devices.
38
What does OVAL stand for?
Open Vulnerability Assessment Language ## Footnote OVAL is an international standard for encoding system security information.
39
What does P12 stand for?
PKCS #12 ## Footnote P12 is a binary format for storing a bundle of cryptographic objects.
40
What does P2P stand for?
Peer to Peer ## Footnote P2P is a decentralized communications model in which each party has the same capabilities.
41
What does PaaS stand for?
Platform as a Service ## Footnote PaaS is a cloud computing model that provides a platform allowing customers to develop, run, and manage applications.
42
What does PAC stand for?
Proxy Auto Configuration ## Footnote PAC is a file that defines how web browsers can automatically select the appropriate proxy server.
43
What does PAM stand for?
Pluggable Authentication Modules ## Footnote PAM is a framework for integrating multiple authentication methods into applications.
44
What does PAP stand for?
Password Authentication Protocol ## Footnote PAP is a simple authentication protocol used to validate users.
45
What does PAT stand for?
Port Address Translation ## Footnote PAT is a type of network address translation that allows multiple devices on a local network to be mapped to a single public IP address.
46
What does PBKDF2 stand for?
Password-based Key Derivation Function 2 ## Footnote PBKDF2 is a key derivation function that is used to derive one or more secret keys from a password.
47
What does PBX stand for?
Private Branch Exchange ## Footnote PBX is a private telephone network used within an organization.
48
What does PCAP stand for?
Packet Capture ## Footnote PCAP is a file format used to capture network packets for analysis.
49
What does PEAP stand for?
Protected Extensible Authentication Protocol ## Footnote PEAP is a method to securely transmit authentication information over a wireless network.
50
What does PED stand for?
Personal Electronic Device ## Footnote PED refers to any electronic device that is used by an individual for personal purposes.
51
What does PEM stand for?
Privacy-enhanced Electronic Mail ## Footnote PEM is a standard for securing email messages.
52
What does PFS stand for?
Perfect Forward Secrecy ## Footnote PFS is a property of secure communication protocols that ensures session keys are not compromised even if the private key is compromised.
53
What does PFX stand for?
Personal Exchange Format ## Footnote PFX is a file format that is used to store a certificate and its private key.
54
What does PGP stand for?
Pretty Good Privacy ## Footnote PGP is an encryption program that provides cryptographic privacy and authentication for data communication.
55
What does PHI stand for?
Personal Health Information ## Footnote PHI refers to any information that can be used to identify a patient and relates to their health status.
56
What does PII stand for?
Personally Identifiable Information ## Footnote PII is any data that could potentially identify a specific individual.
57
What does PIV stand for?
Personal Identity Verification ## Footnote PIV is a standard for secure and reliable identification of individuals.
58
What does PKI stand for?
Public Key Infrastructure ## Footnote PKI is a framework for managing digital certificates and public-key encryption.
59
What does POODLE stand for?
Padding Oracle on Downgrade Legacy Encryption ## Footnote POODLE is a security vulnerability that affects SSL 3.0.
60
What does POP stand for?
Post Office Protocol ## Footnote POP is a protocol used by email clients to retrieve emails from a server.
61
What does POTS stand for?
Plain Old Telephone Service ## Footnote POTS refers to the traditional analog telephone service.
62
What does PPP stand for?
Point-to-Point Protocol ## Footnote PPP is a data link protocol commonly used to establish a direct connection between two networking nodes.
63
What does PPTP stand for?
Point-to-Point Tunneling Protocol ## Footnote PPTP is a method for implementing virtual private networks.
64
What does PSK stand for?
Pre-shared Key ## Footnote PSK is a shared secret used for authentication in wireless networks.
65
What does PTZ stand for?
Pan-Tilt-Zoom ## Footnote PTZ refers to cameras that can move in multiple directions and zoom in/out.
66
What does RA stand for?
Recovery Agent ## Footnote RA is an entity that manages the recovery of encrypted data.
67
What does RA stand for in Registration Authority?
Registration Authority ## Footnote RA is an entity that verifies the identity of users requesting digital certificates.
68
What does RAD stand for?
Rapid Application Development ## Footnote RAD is a software development methodology that emphasizes quick development and iteration.
69
What does RADIUS stand for?
Remote Authentication Dial-in User Server ## Footnote RADIUS is a networking protocol that provides centralized Authentication, Authorization, and Accounting management.
70
What does RAID stand for?
Redundant Array of Inexpensive Disks ## Footnote RAID is a data storage virtualization technology that combines multiple physical disk drive components.
71
What does RAS stand for?
Remote Access Server ## Footnote RAS is a server that allows remote users to connect to a network.
72
What does RAT stand for?
Remote Access Trojan ## Footnote RAT is a type of malware that allows unauthorized remote access to a user's computer.
73
What does RBAC stand for?
Role-based Access Control ## Footnote RBAC is a method of regulating access to computer or network resources based on the roles of individual users.
74
What does RBAC stand for in Rule-based Access Control?
Rule-based Access Control ## Footnote RBAC is a method of access control that uses rules to determine access permissions.
75
What does RC4 stand for?
Rivest Cipher version 4 ## Footnote RC4 is a stream cipher that is used in various encryption protocols.
76
What does RDP stand for?
Remote Desktop Protocol ## Footnote RDP is a protocol that allows users to connect to another computer over a network.
77
What does RFID stand for?
Radio Frequency Identifier ## Footnote RFID uses electromagnetic fields to automatically identify and track tags attached to objects.
78
What does RIPEMD stand for?
RACE Integrity Primitives Evaluation Message Digest ## Footnote RIPEMD is a family of cryptographic hash functions.
79
What does ROI stand for?
Return on Investment ## Footnote ROI is a performance measure used to evaluate the efficiency of an investment.
80
What does RMF stand for?
Risk Management Framework ## Footnote RMF is a structured process that integrates risk management activities into the system development life cycle.
81
What does RPO stand for?
Recovery Point Objective ## Footnote RPO is the maximum acceptable amount of data loss measured in time.
82
What does RSA stand for?
Rivest, Shamir, & Adleman ## Footnote RSA is a public-key cryptosystem used for secure data transmission.
83
What does RTBH stand for?
Remotely Triggered Black Hole ## Footnote RTBH is a method used to mitigate DDoS attacks by dropping malicious traffic.
84
What does RTO stand for?
Recovery Time Objective ## Footnote RTO is the maximum acceptable amount of time to restore a system after a failure.
85
What does RTOS stand for?
Real-time Operating System ## Footnote RTOS is an operating system intended to serve real-time applications that process data as it comes in.
86
What does RTP stand for?
Real-time Transport Protocol ## Footnote RTP is a network protocol for delivering audio and video over IP networks.
87
What does S/MIME stand for?
Secure/Multipurpose Internet Mail Extensions ## Footnote S/MIME is a standard for public key encryption and signing of MIME data.
88
What does SaaS stand for?
Software as a Service ## Footnote SaaS is a software distribution model in which applications are hosted by a service provider and made available to customers over the internet.
89
What does SAML stand for?
Security Assertions Markup Language ## Footnote SAML is an open standard for exchanging authentication and authorization data between parties.
90
What does SAN stand for?
Storage Area Network ## Footnote SAN is a dedicated network that provides access to consolidated, block-level data storage.
91
What does SAN stand for in Subject Alternative Name?
Subject Alternative Name ## Footnote SAN is an extension to the X.509 specification that allows users to specify additional host names for a single SSL certificate.
92
What does SCADA stand for?
System Control and Data Acquisition ## Footnote SCADA is a system used to monitor and control industrial processes.
93
What does SCAP stand for?
Security Content Automation Protocol ## Footnote SCAP is a suite of specifications that standardizes the format and nomenclature of security-related information.
94
What does SCEP stand for?
Simple Certificate Enrollment Protocol ## Footnote SCEP is a protocol used for the secure distribution of digital certificates.
95
What does SCP stand for?
Secure Copy ## Footnote SCP is a means of securely transferring files between a local host and a remote host.
96
What does SCSI stand for?
Small Computer System Interface ## Footnote SCSI is a set of standards for connecting and transferring data between computers and peripheral devices.
97
What does SDK stand for?
Software Development Kit ## Footnote SDK is a collection of software development tools in one installable package.
98
What does SDLC stand for?
Software Development Life Cycle ## Footnote SDLC is a process for planning, creating, testing, and deploying software.
99
What does SDLM stand for?
Software Development Life Cycle Methodology ## Footnote SDLM refers to the various methodologies used to manage software development projects.
100
What does SDN stand for?
Software Defined Network ## Footnote SDN is an approach to networking that uses software-based controllers to manage network resources.
101
What does SED stand for?
Self-encrypting Drive ## Footnote SED is a hard drive that automatically encrypts data written to it.
102
What does SEH stand for?
Structured Exception Handler ## Footnote SEH is a mechanism in Windows operating systems for handling exceptions.
103
What does SFTP stand for?
Secured File Transfer Protocol ## Footnote SFTP is a secure version of the File Transfer Protocol (FTP) that uses SSH to encrypt data.
104
What does SHA stand for?
Secure Hashing Algorithm ## Footnote SHA is a family of cryptographic hash functions designed by the National Security Agency.
105
What does SHTTP stand for?
Secure Hypertext Transfer Protocol ## Footnote SHTTP is a protocol for transmitting encrypted data over the web.
106
What does SIEM stand for?
Security Information and Event Management ## Footnote SIEM is a solution that aggregates and analyzes security data from across an organization.
107
What does SIM stand for?
Subscriber Identity Module ## Footnote SIM is a card inserted into mobile devices that contains the International Mobile Subscriber Identity (IMSI).
108
What does SLA stand for?
Service Level Agreement ## Footnote SLA is a contract that defines the level of service expected from a service provider.
109
What does SLE stand for?
Single Loss Expectancy ## Footnote SLE is the expected monetary loss every time a risk occurs.
110
What does SMB stand for?
Server Message Block ## Footnote SMB is a network file sharing protocol that allows applications to read and write to files and request services from server programs.
111
What does SMS stand for?
Short Message Service ## Footnote SMS is a text messaging service component of most telephone, internet, and mobile device systems.
112
What does SMTP stand for?
Simple Mail Transfer Protocol ## Footnote SMTP is a protocol for sending email messages between servers.
113
What does SMTPS stand for?
Simple Mail Transfer Protocol Secure ## Footnote SMTPS is an extension of SMTP that adds support for the Transport Layer Security (TLS) protocol.
114
What does SNMP stand for?
Simple Network Management Protocol ## Footnote SNMP is a protocol used for network management and monitoring.
115
What does SOAP stand for?
Simple Object Access Protocol ## Footnote SOAP is a protocol for exchanging structured information in web services.
116
What does SoC stand for?
System on Chip ## Footnote SoC is an integrated circuit that integrates all components of a computer or other electronic system.
117
What does SPF stand for?
Sender Policy Framework ## Footnote SPF is an email validation system designed to prevent spam by verifying sender IP addresses.
118
What does SPIM stand for?
Spam over Internet Messaging ## Footnote SPIM refers to unsolicited messages sent over instant messaging systems.
119
What does SPoF stand for?
Single Point of Failure ## Footnote SPoF is a part of a system that, if it fails, will stop the entire system from working.
120
What does SQL stand for?
Structured Query Language ## Footnote SQL is a standardized programming language used to manage relational databases.
121
What does SRTP stand for?
Secure Real-Time Protocol ## Footnote SRTP provides encryption, message authentication, and integrity, and replay protection to the RTP data in streaming media.
122
What does SSD stand for?
Solid State Drive ## Footnote SSD is a type of storage device that uses flash memory to store data.
123
What does SSH stand for?
Secure Shell ## Footnote SSH is a cryptographic network protocol for operating network services securely over an unsecured network.
124
What does SSID stand for?
Service Set Identifier ## Footnote SSID is a name that identifies a wireless network.
125
What does SSL stand for?
Secure Sockets Layer ## Footnote SSL is a standard security technology for establishing an encrypted link between a server and a client.
126
What does SSO stand for?
Single Sign-on ## Footnote SSO is an authentication process that allows a user to access multiple applications with one set of login credentials.
127
What does STP stand for?
Shielded Twisted Pair ## Footnote STP is a type of cable that protects against electromagnetic interference.
128
What does TACACS+ stand for?
Terminal Access Controller Access Control System Plus ## Footnote TACACS+ is a protocol that provides centralized authentication for users who access network services.
129
What does TCP/IP stand for?
Transmission Control Protocol/Internet Protocol ## Footnote TCP/IP is a set of communication protocols used for the internet and similar networks.
130
What does TGT stand for?
Ticket Granting Ticket ## Footnote TGT is a special type of ticket used in Kerberos authentication.
131
What does TKIP stand for?
Temporal Key Integrity Protocol ## Footnote TKIP is a security protocol used in wireless networks to provide encryption.
132
What does TLS stand for?
Transport Layer Security ## Footnote TLS is a cryptographic protocol designed to provide secure communication over a computer network.
133
What does TOTP stand for?
Time-based One-time Password ## Footnote TOTP is an algorithm that computes a one-time password from a shared secret and the current time.
134
What does TPM stand for?
Trusted Platform Module ## Footnote TPM is a hardware-based security feature that provides secure generation and storage of cryptographic keys.
135
What does TSIG stand for?
Transaction Signature ## Footnote TSIG is a security protocol used to provide authentication for DNS messages.
136
What does UAT stand for?
User Acceptance Testing ## Footnote UAT is the process of verifying that a solution works for the user.
137
What does UAV stand for?
Unmanned Aerial Vehicle ## Footnote UAV refers to an aircraft that operates without a human pilot on board.
138
What does UDP stand for?
User Datagram Protocol ## Footnote UDP is a communication protocol used across the internet for especially time-sensitive transmissions.
139
What does UEFI stand for?
Unified Extensible Firmware Interface ## Footnote UEFI is a modern firmware interface for computers, designed to replace the traditional BIOS.
140
What does UPS stand for?
Uninterruptable Power Supply ## Footnote UPS is a device that provides backup power when the electrical supply fails.
141
What does URI stand for?
Uniform Resource Identifier ## Footnote URI is a string of characters that uniquely identifies a particular resource.
142
What does URL stand for?
Universal Resource Locator ## Footnote URL is the address used to access resources on the internet.
143
What does USB stand for?
Universal Serial Bus ## Footnote USB is a standard for connecting computers and electronic devices.
144
What does USB OTG stand for?
USB On The Go ## Footnote USB OTG is a specification that allows USB devices to act as a host.
145
What does UTM stand for?
Unified Threat Management ## Footnote UTM is a comprehensive security solution that combines multiple security features into a single device.
146
What does UTP stand for?
Unshielded Twisted Pair ## Footnote UTP is a type of cable used in computer networking and telecommunications.
147
What does VDE stand for?
Virtual Desktop Environment ## Footnote VDE is a technology that allows users to access a desktop environment from any device.
148
What does VDI stand for?
Virtual Desktop Infrastructure ## Footnote VDI is a technology that hosts a desktop operating system on a centralized server.
149
What does VLAN stand for?
Virtual Local Area Network ## Footnote VLAN is a logical subnetwork that groups together a collection of devices from different physical LANs.
150
What does VLSM stand for?
Variable Length Subnet Masking ## Footnote VLSM allows for the creation of subnets of different sizes, optimizing IP address usage.
151
What does VM stand for?
Virtual Machine ## Footnote VM is a software emulation of a physical computer that runs an operating system and applications.
152
What does VoIP stand for?
Voice over IP ## Footnote VoIP is a technology that allows voice communication and multimedia sessions over the internet.
153
What does VPN stand for?
Virtual Private Network ## Footnote VPN is a service that creates a secure connection over a less secure network.
154
What does VTC stand for?
Video Teleconferencing ## Footnote VTC is a technology that allows two or more locations to communicate via two-way video and audio transmissions.
155
What does WAF stand for?
Web Application Firewall ## Footnote WAF is a security system that monitors and filters HTTP traffic to and from a web application.
156
What does WAP stand for?
Wireless Access Point ## Footnote WAP is a device that allows wireless devices to connect to a wired network using Wi-Fi.
157
What does WEP stand for?
Wired Equivalent Privacy ## Footnote WEP is a security protocol that was designed to provide a wireless local area network with a level of security and privacy.
158
What does WIDS stand for?
Wireless Intrusion Detection System ## Footnote WIDS is a system that monitors a wireless network for unauthorized access.
159
What does WIPS stand for?
Wireless Intrusion Prevention System ## Footnote WIPS is a system that detects and prevents unauthorized access to a wireless network.
160
What does WORM stand for?
Write Once Read Many ## Footnote WORM refers to storage media that can be written once and read many times.
161
What does WPA stand for?
WiFi Protected Access ## Footnote WPA is a security protocol designed to create secure wireless networks.
162
What does WPA2 stand for?
WiFi Protected Access 2 ## Footnote WPA2 is an updated version of WPA that provides stronger security.
163
What does WPS stand for?
WiFi Protected Setup ## Footnote WPS is a network security standard that allows users to easily secure a wireless home network.
164
What does WTLS stand for?
Wireless TLS ## Footnote WTLS is a security protocol for wireless communication.
165
What does XML stand for?
Extensible Markup Language ## Footnote XML is a markup language that defines a set of rules for encoding documents in a format that is both human-readable and machine-readable.
166
What does XOR stand for?
Exclusive Or ## Footnote XOR is a logical operation that outputs true only when the inputs differ.
167
What does XSRF stand for?
Cross-site Request Forgery ## Footnote XSRF is an attack that tricks the victim into submitting a request that they did not intend.
168
What does XSS stand for?
Cross-site Scripting ## Footnote XSS is a security vulnerability that allows attackers to inject malicious scripts into content from otherwise trusted websites.