Acronyms (Page 17) Flashcards

1
Q

SOW

A

Statement of Work

A document routinely employed in the field of project management. It defines project-specific activities, deliverables, and timelines for a vendor providing services to the client.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

SPF

A

Sender Policy Framework

An email authentication method designed to detect forging sender addresses during the delivery of the email.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

SPIM

A

Spam over Internet Messaging

Unsolicited messages sent via an instant messaing (IM) system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

SQL

A

Structured Query Language

A domain-specific language used in programming and designed for managing data held in a relational database management system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

SQLi

A

SQL Injection

A code injection technique used to attack data-driven applications, in which malicious SQL statements are inserted into an entry field for execution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

SRTP

A

Secure Real-Time Protocol

A profile of the Real-Time Transport Protocol (RTP) intended to provide encryption, message authentication, and integrity, and replay protection to the RTP data in both unicast and multicast applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

SSD

A

Solid State Drive

A storage device containing nonvolatile flash memory, used in place of a hard disk because of its much greater speed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

SSH

A

Secure Shell

A cryptographic network protocol for establishing an encrypted link between a web server and a browser.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SSL

A

Secure Sockets Layer

The standard security technology for establishing an encrypted link between a web server and a browser.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

SSO

A

Single Sign-on

A property of access control of multiple related, yet independent, software systems. With this property, a user logs in with a single ID and password to gain access to any of several related systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

STIX

A

Structured Threat Information eXchange

A language and serialization format used to exchange cyber threat intelligence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

SWG

A

Secure Web Gateway

Solutions that filter unwanted software/malware from user-initiated web/internet traffic and enforce corporate and regulatory policy compliance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

TACACS+

A

Terminal Access Controller Access Control Systems

A security application that provides centralized validation of users attempting to gain access to a router or network access server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

TAXII

A

Trusted Automated eXchange of Indicator Information

An application layer protocol for the communication of cyber threat information in a simple and scalable manner.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

TCP/IP

A

Transmission Control Protocol/Internet Protocol

A set of communication protocols used to interconnect network devices on the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

TGT

A

Ticket Granting Ticket

A part of the Kerberos protocol used for authenticating requests for service tickets within the network.

17
Q

TKIP

A

Temporal Key Integrity Protocol

A security protocol used in the IEEE 802.11 wireless networking standard.