Acronyms (Page 12) - Reverse Flashcards

1
Q

A decentralized communications model in which each party has the same capabilities and either party can initiate a communication session.

A

P2P

Peer to Peer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A category of cloud computing services that provides a platform allowing customers to develop, run, and manage applications without the complexity of building and maintaining the infrastructure typically associated with developing and launching an app.

A

PaaS

Platform as a Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A method used by web browsers to select an appropriate proxy server automatically.

A

PAC

Proxy Auto Configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A comprehensive approach to controlling and monitoring privileged access to critical assets and systems.

A

PAM

Privileged Access Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A mechanism to integrate multiple low-level authentication schemes into a high-level application programming interface (API).

A

PAM

Pluggable Authentication Modules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A simple, plaintext password authentication protocol.

A

PAP

Password Authentication Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A feature of a network device that translates TCP or UDP communications made between hosts on a private network and hosts on a public network.

A

PAT

Port Address Translation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A key derivation function that is part of RSA Laboratories’ Public-Key Cryptography Standards (PKCS) series, sepcifically PKCS #5 v2.0.

A

PBKDF2

Password-based Key Derivation Function 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A private telephone network used within a company or organization.

A

PBX

Private Branch Exchange

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The act of capturing data packets crossing a specific segment of a network.

A

PCAP

Packet Capture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A set of security standards designed to ensure that all companies that accept, process, store or transmit credit card information maintain a secure environment.

A

PCI DSS

Payment Card Industry Data Security Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A device fitted with multiple outputs designed to distribute electric power, especially to racks of computers and networking equipment located within a data center.

A

PDU

Power Distribution Unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A method to securely transmit authentication information, including passwords, over wireless networks.

A

PEAP

Protected Extensible Authentication Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A small electronic device typically used for personal tasks such as communication, data management, and recreation.

A

PED

Personal Electronic Device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A de facto standard for secure email in the Internet community.

A

PEM

Privacy Enhanced Mail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A property of secure communication protocols in which compromise of long-term keys does not compromise past session keys.

A

PFS

Perfect Forward Secrecy

17
Q

An encryption program that provides cryptographic privacy and authentication for data communication.

A

PGP

Pretty Good Privacy