Acronyms (M-Z) - ECPI Flashcards
MAC (Mandatory Access Control)
Purpose?
Mandatory Access Control
MAC is a security model that restricts access to resources based on the user’s clearance level.
What does MAC stand for in Media Access Control?
Media Access Control
MAC is a protocol that governs how data packets are placed on the network.
What does MAC stand for in Message Authentication Code?
Message Authentication Code
MAC is used to verify the integrity and authenticity of a message.
What does MAN stand for?
Metropolitan Area Network
MAN is a network that covers a larger geographic area than a local area network (LAN) but smaller than a wide area network (WAN).
What does MBR stand for?
Master Boot Record
MBR is a special type of boot sector that is used to start the operating system.
What does MD5 stand for?
Message Digest 5
MD5 is a widely used cryptographic hash function that produces a 128-bit hash value.
What does MDM stand for?
Mobile Device Management
MDM refers to software solutions that allow IT administrators to manage and secure mobile devices.
What does MFA stand for?
Multi-Factor Authentication
MFA is a security mechanism that requires multiple forms of verification to access an account.
What does MFD stand for?
Multi-function Device
MFD refers to a device that can perform multiple functions such as printing, scanning, and copying.
What does MITM stand for?
Man-in-the-Middle
MITM is a security attack where the attacker secretly relays and possibly alters the communication between two parties.
What does MMS stand for?
Multimedia Message Service
MMS is a standard way to send messages that include multimedia content to and from mobile devices.
What does MOA stand for?
Memorandum of Agreement
MOA is a document that outlines the terms and details of an agreement between parties.
What does MOU stand for?
Memorandum of Understanding
MOU is a formal agreement between two or more parties outlining their intentions.
What does MPLS stand for?
Multi-protocol Label Switching
MPLS is a data-carrying technique for high-performance telecommunications networks.
What does MSCHAP stand for?
Microsoft Challenge Handshake Authentication Protocol
MSCHAP is a password-based authentication protocol used in Microsoft environments.
What does MSP stand for?
Managed Service Provider
MSP is a company that remotely manages a customer’s IT infrastructure and end-user systems.
What does MTBF stand for?
Mean Time Between Failures
MTBF is a measure of reliability for repairable items.
What does MTTF stand for?
Mean Time to Failure
MTTF is the average time until a non-repairable system fails.
What does MTTR stand for?
Mean Time to Recover or Mean Time to Repair
MTTR is the average time taken to repair a system and restore it to operational status.
What does MTU stand for?
Maximum Transmission Unit
MTU is the size of the largest packet that can be sent over a network.
What does NAC stand for?
Network Access Control
NAC is a security solution that enforces policies on devices accessing a network.
What does NAT stand for?
Network Address Translation
NAT is a method of remapping an IP address space into another by modifying network address information.
What does NDA stand for?
Non-disclosure Agreement
NDA is a legally binding contract that establishes a confidential relationship between parties.
What does NFC stand for?
Near Field Communication
NFC is a set of communication protocols that enable two electronic devices to communicate when they are close to each other.
What does NGAC stand for?
Next Generation Access Control
NGAC refers to advanced access control mechanisms that enhance security.
What does NIDS stand for?
Network-based Intrusion Detection System
NIDS monitors network traffic for suspicious activity.
What does NIPS stand for?
Network-based Intrusion Prevention System
NIPS actively prevents and blocks potential threats in network traffic.
What does NIST stand for?
National Institute of Standards & Technology
NIST is a physical sciences laboratory and non-regulatory agency of the U.S. Department of Commerce.
What does NTFS stand for?
New Technology File System
NTFS is a file system that the Windows NT operating system uses for storing and retrieving files.
What does NTLM stand for?
New Technology LAN Manager
NTLM is a suite of Microsoft security protocols that provides authentication, integrity, and confidentiality to users.
What does NTP stand for?
Network Time Protocol
NTP is a networking protocol for clock synchronization between computer systems.
What does OAUTH stand for?
Open Authorization
OAUTH is an open standard for access delegation commonly used for token-based authentication.
What does OCSP stand for?
Online Certificate Status Protocol
OCSP is used for obtaining the revocation status of an X.509 digital certificate.
What does OID stand for?
Object Identifier
OID is a unique identifier used to name an object in a way that is globally unique.
What does OS stand for?
Operating System
OS is system software that manages computer hardware and software resources.
What does OTA stand for?
Over The Air
OTA refers to the wireless delivery of software updates and data to devices.
What does OVAL stand for?
Open Vulnerability Assessment Language
OVAL is an international standard for encoding system security information.
What does P12 stand for?
PKCS #12
P12 is a binary format for storing a bundle of cryptographic objects.
What does P2P stand for?
Peer to Peer
P2P is a decentralized communications model in which each party has the same capabilities.
What does PaaS stand for?
Platform as a Service
PaaS is a cloud computing model that provides a platform allowing customers to develop, run, and manage applications.
What does PAC stand for?
Proxy Auto Configuration
PAC is a file that defines how web browsers can automatically select the appropriate proxy server.
What does PAM stand for?
Pluggable Authentication Modules
PAM is a framework for integrating multiple authentication methods into applications.
What does PAP stand for?
Password Authentication Protocol
PAP is a simple authentication protocol used to validate users.
What does PAT stand for?
Port Address Translation
PAT is a type of network address translation that allows multiple devices on a local network to be mapped to a single public IP address.
What does PBKDF2 stand for?
Password-based Key Derivation Function 2
PBKDF2 is a key derivation function that is used to derive one or more secret keys from a password.
What does PBX stand for?
Private Branch Exchange
PBX is a private telephone network used within an organization.
What does PCAP stand for?
Packet Capture
PCAP is a file format used to capture network packets for analysis.
What does PEAP stand for?
Protected Extensible Authentication Protocol
PEAP is a method to securely transmit authentication information over a wireless network.
What does PED stand for?
Personal Electronic Device
PED refers to any electronic device that is used by an individual for personal purposes.
What does PEM stand for?
Privacy-enhanced Electronic Mail
PEM is a standard for securing email messages.
What does PFS stand for?
Perfect Forward Secrecy
PFS is a property of secure communication protocols that ensures session keys are not compromised even if the private key is compromised.
What does PFX stand for?
Personal Exchange Format
PFX is a file format that is used to store a certificate and its private key.
What does PGP stand for?
Pretty Good Privacy
PGP is an encryption program that provides cryptographic privacy and authentication for data communication.
What does PHI stand for?
Personal Health Information
PHI refers to any information that can be used to identify a patient and relates to their health status.
What does PII stand for?
Personally Identifiable Information
PII is any data that could potentially identify a specific individual.
What does PIV stand for?
Personal Identity Verification
PIV is a standard for secure and reliable identification of individuals.
What does PKI stand for?
Public Key Infrastructure
PKI is a framework for managing digital certificates and public-key encryption.
What does POODLE stand for?
Padding Oracle on Downgrade Legacy Encryption
POODLE is a security vulnerability that affects SSL 3.0.
What does POP stand for?
Post Office Protocol
POP is a protocol used by email clients to retrieve emails from a server.
What does POTS stand for?
Plain Old Telephone Service
POTS refers to the traditional analog telephone service.
What does PPP stand for?
Point-to-Point Protocol
PPP is a data link protocol commonly used to establish a direct connection between two networking nodes.
What does PPTP stand for?
Point-to-Point Tunneling Protocol
PPTP is a method for implementing virtual private networks.
What does PSK stand for?
Pre-shared Key
PSK is a shared secret used for authentication in wireless networks.
What does PTZ stand for?
Pan-Tilt-Zoom
PTZ refers to cameras that can move in multiple directions and zoom in/out.
What does RA stand for?
Recovery Agent
RA is an entity that manages the recovery of encrypted data.
What does RA stand for in Registration Authority?
Registration Authority
RA is an entity that verifies the identity of users requesting digital certificates.
What does RAD stand for?
Rapid Application Development
RAD is a software development methodology that emphasizes quick development and iteration.
What does RADIUS stand for?
Remote Authentication Dial-in User Server
RADIUS is a networking protocol that provides centralized Authentication, Authorization, and Accounting management.
What does RAID stand for?
Redundant Array of Inexpensive Disks
RAID is a data storage virtualization technology that combines multiple physical disk drive components.
What does RAS stand for?
Remote Access Server
RAS is a server that allows remote users to connect to a network.
What does RAT stand for?
Remote Access Trojan
RAT is a type of malware that allows unauthorized remote access to a user’s computer.
What does RBAC stand for?
Role-based Access Control
RBAC is a method of regulating access to computer or network resources based on the roles of individual users.
What does RBAC stand for in Rule-based Access Control?
Rule-based Access Control
RBAC is a method of access control that uses rules to determine access permissions.
What does RC4 stand for?
Rivest Cipher version 4
RC4 is a stream cipher that is used in various encryption protocols.
What does RDP stand for?
Remote Desktop Protocol
RDP is a protocol that allows users to connect to another computer over a network.
What does RFID stand for?
Radio Frequency Identifier
RFID uses electromagnetic fields to automatically identify and track tags attached to objects.
What does RIPEMD stand for?
RACE Integrity Primitives Evaluation Message Digest
RIPEMD is a family of cryptographic hash functions.
What does ROI stand for?
Return on Investment
ROI is a performance measure used to evaluate the efficiency of an investment.
What does RMF stand for?
Risk Management Framework
RMF is a structured process that integrates risk management activities into the system development life cycle.
What does RPO stand for?
Recovery Point Objective
RPO is the maximum acceptable amount of data loss measured in time.
What does RSA stand for?
Rivest, Shamir, & Adleman
RSA is a public-key cryptosystem used for secure data transmission.
What does RTBH stand for?
Remotely Triggered Black Hole
RTBH is a method used to mitigate DDoS attacks by dropping malicious traffic.
What does RTO stand for?
Recovery Time Objective
RTO is the maximum acceptable amount of time to restore a system after a failure.
What does RTOS stand for?
Real-time Operating System
RTOS is an operating system intended to serve real-time applications that process data as it comes in.
What does RTP stand for?
Real-time Transport Protocol
RTP is a network protocol for delivering audio and video over IP networks.
What does S/MIME stand for?
Secure/Multipurpose Internet Mail Extensions
S/MIME is a standard for public key encryption and signing of MIME data.
What does SaaS stand for?
Software as a Service
SaaS is a software distribution model in which applications are hosted by a service provider and made available to customers over the internet.
What does SAML stand for?
Security Assertions Markup Language
SAML is an open standard for exchanging authentication and authorization data between parties.
What does SAN stand for?
Storage Area Network
SAN is a dedicated network that provides access to consolidated, block-level data storage.
What does SAN stand for in Subject Alternative Name?
Subject Alternative Name
SAN is an extension to the X.509 specification that allows users to specify additional host names for a single SSL certificate.
What does SCADA stand for?
System Control and Data Acquisition
SCADA is a system used to monitor and control industrial processes.
What does SCAP stand for?
Security Content Automation Protocol
SCAP is a suite of specifications that standardizes the format and nomenclature of security-related information.
What does SCEP stand for?
Simple Certificate Enrollment Protocol
SCEP is a protocol used for the secure distribution of digital certificates.
What does SCP stand for?
Secure Copy
SCP is a means of securely transferring files between a local host and a remote host.
What does SCSI stand for?
Small Computer System Interface
SCSI is a set of standards for connecting and transferring data between computers and peripheral devices.
What does SDK stand for?
Software Development Kit
SDK is a collection of software development tools in one installable package.
What does SDLC stand for?
Software Development Life Cycle
SDLC is a process for planning, creating, testing, and deploying software.
What does SDLM stand for?
Software Development Life Cycle Methodology
SDLM refers to the various methodologies used to manage software development projects.
What does SDN stand for?
Software Defined Network
SDN is an approach to networking that uses software-based controllers to manage network resources.
What does SED stand for?
Self-encrypting Drive
SED is a hard drive that automatically encrypts data written to it.
What does SEH stand for?
Structured Exception Handler
SEH is a mechanism in Windows operating systems for handling exceptions.
What does SFTP stand for?
Secured File Transfer Protocol
SFTP is a secure version of the File Transfer Protocol (FTP) that uses SSH to encrypt data.
What does SHA stand for?
Secure Hashing Algorithm
SHA is a family of cryptographic hash functions designed by the National Security Agency.
What does SHTTP stand for?
Secure Hypertext Transfer Protocol
SHTTP is a protocol for transmitting encrypted data over the web.
What does SIEM stand for?
Security Information and Event Management
SIEM is a solution that aggregates and analyzes security data from across an organization.
What does SIM stand for?
Subscriber Identity Module
SIM is a card inserted into mobile devices that contains the International Mobile Subscriber Identity (IMSI).
What does SLA stand for?
Service Level Agreement
SLA is a contract that defines the level of service expected from a service provider.
What does SLE stand for?
Single Loss Expectancy
SLE is the expected monetary loss every time a risk occurs.
What does SMB stand for?
Server Message Block
SMB is a network file sharing protocol that allows applications to read and write to files and request services from server programs.
What does SMS stand for?
Short Message Service
SMS is a text messaging service component of most telephone, internet, and mobile device systems.
What does SMTP stand for?
Simple Mail Transfer Protocol
SMTP is a protocol for sending email messages between servers.
What does SMTPS stand for?
Simple Mail Transfer Protocol Secure
SMTPS is an extension of SMTP that adds support for the Transport Layer Security (TLS) protocol.
What does SNMP stand for?
Simple Network Management Protocol
SNMP is a protocol used for network management and monitoring.
What does SOAP stand for?
Simple Object Access Protocol
SOAP is a protocol for exchanging structured information in web services.
What does SoC stand for?
System on Chip
SoC is an integrated circuit that integrates all components of a computer or other electronic system.
What does SPF stand for?
Sender Policy Framework
SPF is an email validation system designed to prevent spam by verifying sender IP addresses.
What does SPIM stand for?
Spam over Internet Messaging
SPIM refers to unsolicited messages sent over instant messaging systems.
What does SPoF stand for?
Single Point of Failure
SPoF is a part of a system that, if it fails, will stop the entire system from working.
What does SQL stand for?
Structured Query Language
SQL is a standardized programming language used to manage relational databases.
What does SRTP stand for?
Secure Real-Time Protocol
SRTP provides encryption, message authentication, and integrity, and replay protection to the RTP data in streaming media.
What does SSD stand for?
Solid State Drive
SSD is a type of storage device that uses flash memory to store data.
What does SSH stand for?
Secure Shell
SSH is a cryptographic network protocol for operating network services securely over an unsecured network.
What does SSID stand for?
Service Set Identifier
SSID is a name that identifies a wireless network.
What does SSL stand for?
Secure Sockets Layer
SSL is a standard security technology for establishing an encrypted link between a server and a client.
What does SSO stand for?
Single Sign-on
SSO is an authentication process that allows a user to access multiple applications with one set of login credentials.
What does STP stand for?
Shielded Twisted Pair
STP is a type of cable that protects against electromagnetic interference.
What does TACACS+ stand for?
Terminal Access Controller Access Control System Plus
TACACS+ is a protocol that provides centralized authentication for users who access network services.
What does TCP/IP stand for?
Transmission Control Protocol/Internet Protocol
TCP/IP is a set of communication protocols used for the internet and similar networks.
What does TGT stand for?
Ticket Granting Ticket
TGT is a special type of ticket used in Kerberos authentication.
What does TKIP stand for?
Temporal Key Integrity Protocol
TKIP is a security protocol used in wireless networks to provide encryption.
What does TLS stand for?
Transport Layer Security
TLS is a cryptographic protocol designed to provide secure communication over a computer network.
What does TOTP stand for?
Time-based One-time Password
TOTP is an algorithm that computes a one-time password from a shared secret and the current time.
What does TPM stand for?
Trusted Platform Module
TPM is a hardware-based security feature that provides secure generation and storage of cryptographic keys.
What does TSIG stand for?
Transaction Signature
TSIG is a security protocol used to provide authentication for DNS messages.
What does UAT stand for?
User Acceptance Testing
UAT is the process of verifying that a solution works for the user.
What does UAV stand for?
Unmanned Aerial Vehicle
UAV refers to an aircraft that operates without a human pilot on board.
What does UDP stand for?
User Datagram Protocol
UDP is a communication protocol used across the internet for especially time-sensitive transmissions.
What does UEFI stand for?
Unified Extensible Firmware Interface
UEFI is a modern firmware interface for computers, designed to replace the traditional BIOS.
What does UPS stand for?
Uninterruptable Power Supply
UPS is a device that provides backup power when the electrical supply fails.
What does URI stand for?
Uniform Resource Identifier
URI is a string of characters that uniquely identifies a particular resource.
What does URL stand for?
Universal Resource Locator
URL is the address used to access resources on the internet.
What does USB stand for?
Universal Serial Bus
USB is a standard for connecting computers and electronic devices.
What does USB OTG stand for?
USB On The Go
USB OTG is a specification that allows USB devices to act as a host.
What does UTM stand for?
Unified Threat Management
UTM is a comprehensive security solution that combines multiple security features into a single device.
What does UTP stand for?
Unshielded Twisted Pair
UTP is a type of cable used in computer networking and telecommunications.
What does VDE stand for?
Virtual Desktop Environment
VDE is a technology that allows users to access a desktop environment from any device.
What does VDI stand for?
Virtual Desktop Infrastructure
VDI is a technology that hosts a desktop operating system on a centralized server.
What does VLAN stand for?
Virtual Local Area Network
VLAN is a logical subnetwork that groups together a collection of devices from different physical LANs.
What does VLSM stand for?
Variable Length Subnet Masking
VLSM allows for the creation of subnets of different sizes, optimizing IP address usage.
What does VM stand for?
Virtual Machine
VM is a software emulation of a physical computer that runs an operating system and applications.
What does VoIP stand for?
Voice over IP
VoIP is a technology that allows voice communication and multimedia sessions over the internet.
What does VPN stand for?
Virtual Private Network
VPN is a service that creates a secure connection over a less secure network.
What does VTC stand for?
Video Teleconferencing
VTC is a technology that allows two or more locations to communicate via two-way video and audio transmissions.
What does WAF stand for?
Web Application Firewall
WAF is a security system that monitors and filters HTTP traffic to and from a web application.
What does WAP stand for?
Wireless Access Point
WAP is a device that allows wireless devices to connect to a wired network using Wi-Fi.
What does WEP stand for?
Wired Equivalent Privacy
WEP is a security protocol that was designed to provide a wireless local area network with a level of security and privacy.
What does WIDS stand for?
Wireless Intrusion Detection System
WIDS is a system that monitors a wireless network for unauthorized access.
What does WIPS stand for?
Wireless Intrusion Prevention System
WIPS is a system that detects and prevents unauthorized access to a wireless network.
What does WORM stand for?
Write Once Read Many
WORM refers to storage media that can be written once and read many times.
What does WPA stand for?
WiFi Protected Access
WPA is a security protocol designed to create secure wireless networks.
What does WPA2 stand for?
WiFi Protected Access 2
WPA2 is an updated version of WPA that provides stronger security.
What does WPS stand for?
WiFi Protected Setup
WPS is a network security standard that allows users to easily secure a wireless home network.
What does WTLS stand for?
Wireless TLS
WTLS is a security protocol for wireless communication.
What does XML stand for?
Extensible Markup Language
XML is a markup language that defines a set of rules for encoding documents in a format that is both human-readable and machine-readable.
What does XOR stand for?
Exclusive Or
XOR is a logical operation that outputs true only when the inputs differ.
What does XSRF stand for?
Cross-site Request Forgery
XSRF is an attack that tricks the victim into submitting a request that they did not intend.
What does XSS stand for?
Cross-site Scripting
XSS is a security vulnerability that allows attackers to inject malicious scripts into content from otherwise trusted websites.