Acronyms (Page 16) - Reverse Flashcards

1
Q

A secure version of the File Transfer Protocol (FTP) that uses Secure Shell (SSH) to encrypt the data transferred over the network.

A

SFTP

Secured File Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A family of cryptographic hash functions published by the National Institute of Standards and Technology as a U.S. Federal Information Processing Standard.

A

SHA

Secure Hashing Algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An obsolete alternative to HTTPS for encrypting web communications carried over HTTP.

A

SHTTP

Secure Hyptertext Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Software solutions that provide real-time analysis of security alerts generated by applications and network hardware.

A

SIEM

Security Information and Event Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A removable smart card for mobile phones that securely stores the service-subscriber key used to identify a subscriber on mobile telephony devices.

A

SIM

Subscriber Identity Module

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A commitment between a service provider and a client. Particular aspects of the service - quality, availability, responsibilities - are agreed upon between the service provider and the service user.

A

SLA

Service-level Agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A term used in risk management referring to the monetary value expected from the occurence of a risk on an asset.

A

SLE

Single Loss Expectancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A text messaging service component of most telephone, internet, and mobile device systems.

A

SMS

Short Message Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

An internet standard for email transmission across Internet Protocol (IP) networks.

A

SMTP

Simple Mail Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A method for securing SMTP with transport layer security. It is intended to provide authentication of the communicated partners, as well as data integrity and confidentiality.

A

SMTPS

Simple Mail Transfer Protocol Secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

An Internet Standard protocol for collecting and organizing information about managed devices on IP networks and for modifying that information to change device behavior.

A

SNMP

Simple Network Management Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A messaging protocol specification for exchanging structured information in the implementation of web services in computer networks.

A

SOAP

Simple Object Access Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Technologies that enable organizations to colect inputs monitored by the security operations center (SOC).

A

SOAR

Security Orchestration, Automation, and Response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

An integrated circuit that integrates all components of a computer or other electronic systems into a single chip.

A

SoC

System on Chip

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A centralized unit that deals with security issues on an organizational and technical level.

A

SOC

Security Operations Center

How well did you know this?
1
Not at all
2
3
4
5
Perfectly