Acronyms (Page 11) - Reverse Flashcards

1
Q

A set of communication protocols that enable two electronic devices, one of which is usually a portable device such as a smartphone, to establish communnication by bringing them within 4cm of each other.

A

NFC

Near Field Communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A part of the third generation of firewall technology that combines a traditional firewall with other network device filtering functionalities.

A

NGFW

Next-generation Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A system that analyzes incoming network traffic.

A

NIDS

Network-based Intrusion Detection System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A system that monitors a network for malicious activities such as security threats or policy violations.

A

NIPS

Network-based Intrusion Prevention System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A physical sciences laboratory and a non-regulatory agency of the United States Department of Commerce.

A

NIST

National Institute of Standards & Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A proprietary file system developed by Microsoft.

A

NTFS

New Technology File System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A suite of Microsoft security protocols that povides authentication, integrity, and confidentiality to users.

A

NTLM

New Technology LAN Manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A networking protocol for clock synchronization between computer systems over packet-switched, variable-latency data networks.

A

NTP

Network Time Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

An open standard for access delegation, commonly used as a way for Internet users to grant websites or applications access to their information on other websites but without giving them the passwords.

A

OAuth

Open Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

An internet protocol used for obtaining the revocation status of an X.509 digital certificate.

A

OCSP

Online Certificate Status Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

An identifier used to name an object (a set of data) in a globally unique way.

A

OID

Object Identifier

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Software that manages computer hardware, software resources, and provides common services for computer programs.

A

OS

Operating System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Intelligence collected from publicly available sources.

A

OSINT

Open-source Intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A routing protocol for Internet Protocol (IP) networks.

A

OSPF

Open Shortest Path First

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Hardware and software that detects or causes a change through the direct monitoring and/or control of physical devices, processes, and events in the enterprise.

A

OT

Operational Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Wireless transmission of data or software updates to mobile devices.

A

OTA

Over the Air

17
Q

An information security community standard to promote open and publicly available security content.

A

OVAL

Open Vulnerability Assessment Language

18
Q
A